Industrial Cyber Vulnerabilities: Lessons from Stuxnet and the Internet of Things

L. Trautman, Peter C. Ormerod
{"title":"Industrial Cyber Vulnerabilities: Lessons from Stuxnet and the Internet of Things","authors":"L. Trautman, Peter C. Ormerod","doi":"10.2139/SSRN.2982629","DOIUrl":null,"url":null,"abstract":"Cyber breaches continue at an alarming pace with new vulnerability warnings an almost daily occurrence. Discovery of the industrial virus Stuxnet during 2010 introduced a global threat of malware focused toward disruption of industrial control devices. By the year 2020, it is estimated that over 30 billion Internet of Things (IoT) devices will exist. The IoT global market spend is estimated to grow from $591.7 billion in 2014 to $1.3 trillion in 2019 with a compound annual growth rate of 17%. The installed base of IoT endpoints will grow from 9.7 billion in 2014 to more than 25.6 billion in 2019. With this tremendous growth in both data and devices, a security nightmare appears more reasonable than not. The proliferation of novel consumer devices and increased Internet-dependent business and government data systems introduces vulnerabilities of unprecedented magnitude. \nThis paper adds to our understanding of the development of cyber vulnerabilities resulting directly from: (1) the Stuxnet code and its progeny, and (2) widespread malware exposure associated with the IoT.","PeriodicalId":83419,"journal":{"name":"University of Miami law review","volume":"72 1","pages":"761"},"PeriodicalIF":0.0000,"publicationDate":"2017-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.2139/SSRN.2982629","citationCount":"22","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"University of Miami law review","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.2139/SSRN.2982629","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 22

Abstract

Cyber breaches continue at an alarming pace with new vulnerability warnings an almost daily occurrence. Discovery of the industrial virus Stuxnet during 2010 introduced a global threat of malware focused toward disruption of industrial control devices. By the year 2020, it is estimated that over 30 billion Internet of Things (IoT) devices will exist. The IoT global market spend is estimated to grow from $591.7 billion in 2014 to $1.3 trillion in 2019 with a compound annual growth rate of 17%. The installed base of IoT endpoints will grow from 9.7 billion in 2014 to more than 25.6 billion in 2019. With this tremendous growth in both data and devices, a security nightmare appears more reasonable than not. The proliferation of novel consumer devices and increased Internet-dependent business and government data systems introduces vulnerabilities of unprecedented magnitude. This paper adds to our understanding of the development of cyber vulnerabilities resulting directly from: (1) the Stuxnet code and its progeny, and (2) widespread malware exposure associated with the IoT.
工业网络漏洞:Stuxnet和物联网的教训
网络攻击仍在以惊人的速度继续,几乎每天都有新的漏洞警告出现。2010年,工业病毒Stuxnet的发现引入了一种全球性的恶意软件威胁,其主要目的是破坏工业控制设备。到2020年,预计将存在超过300亿个物联网(IoT)设备。物联网全球市场支出预计将从2014年的5917亿美元增长到2019年的1.3万亿美元,复合年增长率为17%。物联网终端的安装基数将从2014年的97亿增长到2019年的256亿以上。随着数据和设备的巨大增长,安全噩梦似乎更合理。新型消费设备的激增以及依赖互联网的企业和政府数据系统的增加带来了前所未有的严重漏洞。本文增加了我们对直接由以下因素导致的网络漏洞发展的理解:(1)震网代码及其后代,以及(2)与物联网相关的广泛恶意软件暴露。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信