Managing IoT Cybersecurity Threats in the Energy Cloud Ecosystem
|出版日期||內容資訊||英文 13 Pages; 3 Tables, Charts & Figures
|能源雲端生態系統IoT網路安全面的威脅與管理 Managing IoT Cybersecurity Threats in the Energy Cloud Ecosystem|
|出版日期: 2018年02月19日||內容資訊: 英文 13 Pages; 3 Tables, Charts & Figures||
Cybersecurity attacks threaten the grid, enterprises, and consumer devices on a nearly constant basis. The growing adoption of Internet of Things (IoT) devices and systems heightens this threat, giving attackers an expanding number of vectors and surfaces to target. At risk are not only valuable digital assets, private information, and corporate secrets, but also potential physical harm as the result of a cyber attack. From an enterprise perspective, Oracle Chairman Larry Ellison has said companies are losing this cyber war, adding: "Make no mistake, it's a war."
The situation is serious, and the urgency to act among corporations is more apparent than it was just a few years ago. Technology solution vendors report a change among corporate customers that now demand more robust security all along the value or supply chain to defend against such intrusions. These customers are aware of the security risks related to IoT projects and have made security a much higher priority. Security experts say new tools and methods are in place for detecting and preventing attacks, and the effort to stay ahead of bad actors is ongoing. On the consumer side, there is a similar need to improve security for connected home devices and services, but less urgency since the stakes vary. Nonetheless, as more people adopt IoT technologies and new threats appear, the need for stronger IoT security endures.
This Navigant Research report examines the IoT cybersecurity threats challenging not only utilities, but also other enterprises that have deployed or will be deploying IoT technologies. It examines some of the regulatory frameworks shaping this market and considers the basic strategies that often go unheeded but are necessary for a successful and secure IoT implementation. This study also offers practical steps that stakeholders should take to significantly reduce the ongoing risks they face from cyber attacks.