How to Secure Edge Computing in an Industrial IoT Network
When it comes to disruptive technologies the Industrial Internet of Things (IIoT), using edge computing to enhance manufacturing and industrial processes, is right at the head of the pack. Unfortunately, the IIoT is also a top-of-the-agenda goal for attackers eager to target smart sensors and related devices for financial gain or amusement.
Yet an emerging generation of interconnected smart devices also presents a rich new target for attackers, Emiliani noted. “Lots of connected IIoT devices contain well-known, exploitable vulnerabilities,” he observed. “Additionally, it’s difficult to figure out which devices are interconnected into an organization’s network and [to] know how to mitigate different risks.”
IIoT edge device risks can be greatly reduced by implementing a few basic security measures, such as physically securing devices, not using default passwords and disabling unused services/ports, Bendis said. “These measures are relatively easy to implement, but significantly increase security,” he noted. “Furthermore, coordinating with a firm’s in-house IT expertise prior to implementing edge computing devices is a prudent measure that has little cost but can greatly enhance security.”
Source: NETWORKComputing