O'Reilly logo

Industrial Internet by Jon Bruner

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 2. Security

Adding software on top of machines and connecting them to networks creates tempting targets for malicious hackers. The evolution of industrial internet security is much like the evolution of PC security: many systems that are now being networked have historically enjoyed security by isolation, and, just as the original generation of PC operating systems didn’t anticipate connections to the Internet, many industrial systems were not built with outside contact in mind.

The inherent scalability of software means that a single exploit can propagate fast; once discovered, an exploit can be used against lots of machines. Think of a car’s odometer: the move to digital mileage counts, stored in software, makes it more difficult to tamper with the readout, but it expands the prospective target of an exploit from just one car (for mechanical odometers) to every car that uses the same software.

Tools like Shodan[9], a search engine for the Internet of Things, and Digital Bond’s Basecamp[10], a database of industrial control exploits, illustrate the scale of the industrial internet and its vulnerabilities.

image with no caption

Shodan is a search engine for Internet-connected devices, including some industrial control systems and Internet switches. Here it reveals several computers that return a default password field in their HTTP responses.

Industrial-control security is a fast-growing discipline ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required