Skip to main content
News Directory 3
  • Home
  • Business
  • Entertainment
  • Health
  • News
  • Sports
  • Tech
  • World
Menu
  • Home
  • Business
  • Entertainment
  • Health
  • News
  • Sports
  • Tech
  • World
IoT Security: Protect Your Devices - News Directory 3

IoT Security: Protect Your Devices

June 3, 2025 Catherine Williams Tech
News Context
At a glance
  • Cyberattacks targeting critical infrastructure⁤ are on the rise, posing ⁤a significant ⁣threat to communities.
  • The growing ⁣number of⁣ Internet of Things (IoT) devices, especially Industrial ‌Internet⁢ of Things (IIoT) devices, expands the potential attack surface.These devices, which manage interaction networks, power grids,...
  • Securing these devices requires a two-pronged approach:⁤ basic cybersecurity hygiene and defense in depth.
Original source: spectrum.ieee.org


Securing IoT Devices:‌ Protecting Critical Infrastructure from Cyberattacks














Key Points

  • Cyberattacks on critical infrastructure are increasing, targeting power grids, nuclear plants, and transit systems.
  • The proliferation of Industrial ‌Internet of Things (IIoT) devices expands the attack surface.
  • Basic cybersecurity hygiene and defense-in-depth strategies are​ crucial for securing IoT devices.
  • Roots of ⁣Trust (RoT) and remote attestation enhance device security and intrusion detection.

Securing IoT‌ Devices to Protect⁢ Critical Infrastructure

Updated June 03, 2025
⁣

Cyberattacks targeting critical infrastructure⁤ are on the rise, posing ⁤a significant ⁣threat to communities. A U.S. investigation revealed ⁢that a 2015 power outage ​in Ukraine was the result of a Russian state cyberattack. Since then, attacks have continued, including a 2017 ⁢attempt⁤ to infiltrate a Kansas nuclear power plant‍ and ⁤a 2021 breach of New​ York City’s subway system.

The growing ⁣number of⁣ Internet of Things (IoT) devices, especially Industrial ‌Internet⁢ of Things (IIoT) devices, expands the potential attack surface.These devices, which manage interaction networks, power grids, and chemical plants, frequently​ enough lack‌ robust ⁣security⁢ measures. While the number of IoT devices was ⁤approximately 19⁣ billion at the‍ end of 2024, experts predict it will double by 2030. This proliferation increases the risk ⁤of​ cyberattacks motivated by political or financial gain, potentially causing widespread physical damage.

Securing these devices requires a two-pronged approach:⁤ basic cybersecurity hygiene and defense in depth.

Cybersecurity Hygiene

Cybersecurity hygiene involves several key practices:

  • Avoid default passwords on admin accounts.
  • Regularly apply software updates to⁣ patch vulnerabilities.
  • Use ⁢cryptographic signatures to validate updates.
  • Understand your software⁤ supply chain, including the origin and ‍components of your software.

The U.S.⁢ government’s⁤ software Bill of ‌Materials⁢ (SBOM) initiative helps track software supply-chain provenance,identifying vulnerable packages within a device’s⁤ software. This​ allows both IIoT device suppliers and users to quickly determine if ⁣a device is susceptible to attack and take appropriate action.

Defense in Depth

Defense in depth⁣ emphasizes a‌ layered approach to security, ​rather than relying solely on perimeter defenses.‌ the National Institute of Standards and Technology (NIST) recommends a strategy​ encompassing protection, detection, and remediation.

  • Protect: Use cybersecurity engineering to⁣ prevent ‌intrusions.
  • Detect: Implement mechanisms to identify unexpected intrusions.
  • Remediate: take action ‌to expel intruders and prevent further ⁣damage.

Systems ⁢designed for security⁢ employ a layered approach,with each layer performing an‍ integrity check on the next before starting it. ⁣The innermost layer, known⁣ as the ​Root of Trust (RoT), must be ‌implicitly trusted. Compromising the RoT can be difficult to detect without specialized hardware.

One way to ‍protect⁢ the RoT is to store its firmware in read-only memory. Newer processor chips integrate the RoT‍ directly into the hardware,⁢ making it more resistant to attacks. Remote attestation can⁢ augment ‌this process by collecting and reporting fingerprints gathered by ‍each layer during startup. Hardware components like the ​Trusted Platform ‌Module (TPM) can collect ⁤evidence in⁣ shielded‍ locations, ensuring accurate reporting.

Once an ⁤anomaly is detected, remediation can involve power-cycling the device or ⁢refreshing its software.⁣ Authenticated watchdog‍ timers and other mechanisms can also trigger a ⁣device reset ⁢if it cannot demonstrate ⁤good health.

While these security measures have been available for some time, they are becoming more accessible due to advancements in silicon ⁤vendor technology and the ⁣evolution of reliable software stacks.System integrators must require these features from their suppliers and coordinate‍ them with external ⁢resilience and monitoring mechanisms to fully leverage improved security.

Flow chart showing device⁣ manufacturer flowing to attester and verifier.
To verify that it’s safe to turn on an IoT device,one can use an attestation⁢ and verification protocol provided by the Trusted Computing Group. (Guy Fedorkow, Mark Montgomery)

What’s next

As cyber threats evolve, continuous vigilance and proactive security measures are essential to protect critical infrastructure from attacks targeting IoT and ​IIoT devices. Prioritizing cybersecurity hygiene and defense in depth will ‌be crucial in mitigating risks and ensuring the ‍resilience⁢ of essential⁣ services.

Share this:

  • Share on Facebook (Opens in new window) Facebook
  • Share on X (Opens in new window) X

Related

cyberattacks, cybersecurity, Internet of Things

Search:

News Directory 3

ByoDirectory is a comprehensive directory of businesses and services across the United States. Find what you need, when you need it.

Quick Links

  • Disclaimer
  • Terms and Conditions
  • About Us
  • Advertising Policy
  • Contact Us
  • Cookie Policy
  • Editorial Guidelines
  • Privacy Policy

Browse by State

  • Alabama
  • Alaska
  • Arizona
  • Arkansas
  • California
  • Colorado

Connect With Us

© 2026 News Directory 3. All rights reserved.

Privacy Policy Terms of Service