Danger Looms for Manufacturers in Era of Internet of Things and Hyperconnectivity: School of Applied Technology Assistant Professor Highlights Cybersecurity Threats

Date

As we move further into the era of Internet of Things (IoT) and hyperconnectivity, the potential that technology offers is becoming clearer鈥攚hether it鈥檚 by adding a level of convenience or the opportunities presented to develop smarter, more streamlined processes for a variety of tasks.

Lying under the surface, though, is an issue that does not yet have an answer鈥攈ow to protect hyperconnected IoT devices and the information they hold, particularly from those with the skills to leverage that information. These devices are linked to one another via a network connection鈥攁llowing them to communicate with one another, so an attacker could enter via one device and access others鈥攁nd are easy for humans to interface with.

The ramifications of what a skilled attacker could disrupt by targeting, for instance, a hyperconnected IoT machine that is a part of a manufacturing facility highlights that danger.

鈥淭hink about automation. People are being put off and鈥obots are taking over. It鈥檚 code. You can re-code anything,鈥 says Maurice Dawson, assistant professor of information technology and management in Illinois Tech鈥檚 School of Applied Technology. 鈥淚t鈥檚 very frightening.鈥

Dawson, the director of , has long researched cybersecurity issues, particularly in IoT. Recently, he looked at the security issues facing manufacturers as they enter what is referred to as Industry 4.0, or utilizing an automated, hyperconnected system to more efficiently produce goods.

His paper 鈥溾 showcases the potential issues manufacturers face by working in an environment where, on one hand, they can quickly and efficiently produce goods while, on the other, leave themselves open to a variety of potential threats.

鈥淭he manufacturing floor could serve as a place that allows an attacker not only to gather critical data from devices but inflict damage of any of the products being produced,鈥 Dawson writes in the paper, featured in the Journal of Strategic Management Studies.

Among other concerns, Dawson says, is that some manufacturers are utilizing operating systems that are generations out of date (for example, Windows 98) and haven鈥檛 been updated, making them more susceptible to victimization. Piling on to that, he says, is that many of these manufacturers don鈥檛 have the staff to help guard against attacks.

鈥淵ou are exploiting the network of a large organization. It鈥檚 things like that become a big issue,鈥 Dawson says. 鈥淲e don鈥檛 think of things like that. We have faith that the organization is going to do its best.鈥

Data supports that manufacturers are at risk. An article published in a special report in February for London鈥檚 The Times and The Sunday Times, 鈥,鈥 said that a report from the United Kingdom鈥檚 manufacturers鈥 association and insurer AIG found nearly 50 percent of that country鈥檚 manufacturers had dealt with cyberattacks. Of those attacks, a quarter resulted in financial or business losses. Furthermore, 45 percent of those manufacturers said they were not confident they had the tools to protect themselves.

In the same article, Dawson explained how those attacks, when carried out in a hyperconnected system, drive home just how widespread the fallout could be.

鈥淚magine a large [organization] like Monsanto. A determined hacker has the ability to go in and change the makeup of the seed,鈥 he says in the Times article. 鈥淭hey could make the seed life shorter. If you鈥檙e planning for a harvest, the seeds fail. Now we have an issue of a food shortage. Or alternatively, the hacker can insert additives or ingredients to spark allergies or create reactions.鈥

In his paper, Dawson discusses the need to develop a certified and accredited process for manufacturers to protect these hyperconnected systems to ensure they are 鈥渞outinely checked and meet stringent initial cyber security controls.鈥 He suggests using the National Institute of Standards and Technology鈥檚 Risk Management Framework鈥攁 set of guidelines for how to secure data systems鈥攁s its baseline.

鈥淭he process should include annual security checks to review compliance and reporting to a third party for compliance that does not have ties to the organization,鈥 Dawson writes.

But, if nothing is done, Dawson remains steadfast in the dangers that await. Take, for instance, his example of an attacker, a nation-state or otherwise, that targets a seed in development. A food shortage is one outcome; another is that the attacker could make the victim nation-state reliant on them for food or supplies, altering how well its government functions.

鈥淵ou don鈥檛 need nuclear bombs anymore,鈥 he says. 鈥淚f I can hit you financially, you need me.鈥