- How IIoT Impacts Data and Privacy
How the Industrial Internet of Things Impacts Data and Privacy
For Data Privacy Day, our Cyber Security Chief shares three ways that the IIoT is evolving.
January 25, 2017
For more than a century, Honeywell has worked with companies in the manufacturing and industrial sectors to help them navigate the evolving technological landscape. Here's a snapshot of three ways cyber security has affected the Industrial Internet of Things (IIoT), a network of physical objects imbued with information and communications technologies in manufacturing.
Offers significant value
With the IIoT, we are in an era of interconnected devices and cloud platforms that harness the power of high-speed networks, automation, and big data to increase productivity and deliver a better overall experience. According to Dr. Jim Tully with the Gartner Group (via Forbes), "... the processing and analysis of [IoT] data will generate much value for enterprises across many business functions, creating new, far-reaching opportunities for digital marketing."
Threatens Business Operations and Data
While IIoT is benefiting manufacturers, service providers, and customers, it also poses real risks if not built and operated securely. Cyber criminals understand the significance of having access to IIoT devices and the platforms used for machine learning and data analytics, and have shown they are eager to expand their targeting and exploitation activities.Recently, we've seen hackers exploit connected "smart" devices using the Mirai botnet, malware that takes control of computers, to conduct a massive Distributed Denial of Service cyber-attack against commercial Internet sites. It impacted more than 500,000 IoT devices in 164 countries simply because they lacked strong security credentials.
White hat hackers, experts who test security for ethical reasons, demonstrated that vehicles, including their drivetrain and braking systems, could be compromised and controlled remotely. Theft of data on a grand scale is possible by hacking into insecure cloud storage systems or tapping into the stream of data flowing between customer and service provider.
Product Cyber SecurityIn today's cyber threat environment, developing secure products all starts with designing security into our software and hardware from the beginning and managing risk across their entire life cycle. We understand that developing connected products that are resilient to malicious tampering involves having proficient cyber security professionals, mature security processes and best practices, and advanced capabilities to continuously monitor for threats, reduce vulnerabilities, and actively manage cyber incidents when they occur. As a software-industrial company, Honeywell's innovative technologies and solutions improve quality of life for people around the world, which is why cyber security and data protection are at the forefront of how we do business.
By Jason Christman
Cyber Security Chief