3 years ago

2017-11 How to use cyberattacks to increase security

  • Text
  • Cyberattacks
  • Honeypot
  • Industrial
  • Auvesy
  • Landau
  • Pfalz
  • Switches
  • Hacker
  • Attacks
  • Fichtenstrasse

2017-11 How to use cyberattacks to increase

How to use cyberattacks to increase security How to use cyberattacks to increase security A cybercriminal can resist anything except temptation In order to systematically detect and defend against hacker attacks on industrial targets, socalled honeypots scenarios are often used. In many of these, false pots of honey are left out in the open and the real pots of honey—valuable data, software and hardware—are protected as a result. A good example of a false pot of honey in an industrial environment is a data-routing network switch. In this article, we take a closer look at how this could theoretically work in an operational production facility. If we want to effectively protect ourselves at the earliest possible stage against attacks, we need to understand the continually evolving strategies being used by hackers. Obviously it is not a simple matter of disabling the firewall and password-protection then waiting to see what happens. You would certainly experience a wave of attacks, but would learn little or nothing about realworld sophisticated attempts to steal and manipulate. And, of course, it is completely out of the question to expose real data, which in many cases would not only be irresponsible, but also illegal. But there are ways of using honeypot scenarios to open the door, just a crack, without risking damage. No company, however, should ever attempt to do so without first obtaining expert Fig. 1: Classic honeypot scenario: A "dummy" switch is set up to attract attacks then closely monitored © AUVESY GmbH · Fichtenstrasse 38 B · 76829 Landau in der Pfalz · Germany Last updated: 20 Nov 2017 Page 1 of 4

Factsheets collection

Existing customers – our client base speaks for itself

© Copyright 2022 AUVESY GmbH - All rights reserved.