Download PDF

Security Claims Evaluation

Security claims evaluation is an open and easily configurable cybersecurity platform for the evaluation of Endpoint, gateway, and other networked components’ security capabilities. In an industrial environment setting, monitoring of sensors provides a window into the system and operational efficiencies. Specifically, monitoring key parameters such as temperature, vibration, currents, and voltage provide the operator with insights into whether operations are normal, within normal failure mode, or whether there is an indication of a cybersecurity/security breach.

Security claims evaluation provides a platform for users to evaluate whether data from the sensors under test is indicative of normal operation or abnormal operation in a non-invasive and non-intrusive manner. Furthermore, using Machine Learning in combination with real-time analytics capabilities, the sensor operation can be monitored and analyzed 24/7. Logging of abnormal events can be performed for further assessment and future remediation actions. Through running a pre-defined security test suite that encompasses pen testing, known vulnerabilities, and other testing methodologies, testbed users’ security claims can be evaluated at a single or multiple connection points – encompassing an Endpoint to a gateway to cloud assessment. A report based on the test results can be provided to users describing potential security weaknesses and proposed recommendations and remediation methods.

  • Automotive
  • Other
  • Bastille Networks: MouseJack Case Study
    In order to prevent eavesdropping, most vendors encrypt the data being transmitted by wireless keyboards, however it appears that the same security was not built into the mouse communications. The communication between the dongle and mice tested by the research team showed that there was no authentication in place, leaving the dongle unable to determine the difference between commands originating from the user’s mouse and those coming from an attacker. This results in the ability for an attacker to pretend to be a mouse and transmit their own packets to the dongle.
    The main objective is the software roll out to customers. At a closer look the licensing platform should be an entry point for end users with granted rights only to access their specific licenses, safe enough to guarantee a protected environment even without dongle distribution in the field, and fully powerful for optimal and swift data processing even on a time box implementation scenario.
    Cisco: Cisco Systems Use the Observer Platform for Faster Troubleshooting
    Prior to purchasing Observer, Cisco Systems experienced a lack of visibility during and after network events.“I needed large data captures and a way to manipulate them,” says Eric Arnold, Service Provider Video TAC Manager for the company.Arnold states that Cisco Systems chose Observer over competitors because of the packet capture and storage capabilities.
  • The Internet of Things (IoT) security market is expected to grow from USD 6.62 billion in 2017 to USD 29.02 billion by 2022, at a Compound Annual Growth Rate (CAGR) of 34.4%.

    Source: Markets and Markets

© 2021 IoT ONE