{"id":2612,"date":"2017-12-28T14:21:07","date_gmt":"2017-12-28T17:21:07","guid":{"rendered":"https:\/\/www.nachodelatorre.com.ar\/mosconi\/?p=2612"},"modified":"2017-12-28T14:21:07","modified_gmt":"2017-12-28T17:21:07","slug":"iot-esta-cambiando-el-significado-de-infraestructura-critica","status":"publish","type":"post","link":"https:\/\/www.fie.undef.edu.ar\/ceptm\/?p=2612","title":{"rendered":"IoT est\u00e1 cambiando el significado de &#8216;infraestructura cr\u00edtica&#8217;"},"content":{"rendered":"<p>La proliferaci\u00f3n de dispositivos de Internet vinculados a industrias cr\u00edticas como el transporte y la atenci\u00f3n m\u00e9dica est\u00e1 cambiando la perspectiva sobre lo que constituye una infraestructura cr\u00edtica.<!--more--><\/p>\n<div class=\"row\">\n<div class=\"col-md-12 col-xs-12 col-print-12\">\n<p class=\"element element-paragraph\"><img loading=\"lazy\" class=\" alignright\" src=\"https:\/\/www.armytimes.com\/resizer\/2G-RKWnbHpWlrHynnBUBT6bHaKw=\/1200x0\/filters:quality(100)\/arc-anglerfish-arc2-prod-mco.s3.amazonaws.com\/public\/3IWN5ZHZONE2ZDHXRD63UCA2KE.jpg\" alt=\"\" width=\"444\" height=\"232\" \/>The proliferation of internet of things devices tied into critical industries such as transportation and healthcare is changing the perspective on what constitutes critical infrastructure, according to government and industry experts who spoke at the 2017 CyberCon.<\/p>\n<\/div>\n<\/div>\n<div class=\"row\">\n<div class=\"col-md-12 col-xs-12 col-print-12\">\n<p class=\"element element-paragraph\">\u201cThe attack surface is going to expand greatly,\u201d said Ret. Maj. Gen John Davis, vice president and federal chief security officer at Palo Alto Networks. \u201cWhen we start connecting all of these other devices, like devices that are involved in life-saving functions \u2013 transportation, cars \u2013 when we start connecting these things, we\u2019re opening up a whole different category of impact. I think we will put people\u2019s lives at risk, and I think there will be tremendous impact to national security, economic prosperity, public safety. So, I worry about the direction that this is going in.\u201d<\/p>\n<\/div>\n<\/div>\n<div class=\"row\">\n<div class=\"col-md-12 col-xs-12 col-print-12\">\n<p class=\"element element-paragraph\">According to Jeanette Manfra, assistant secretary in the Department of Homeland Security\u2019s Office of Cybersecurity and Communications, digital devices are changing the meaning of infrastructure that used to refer only to physical systems.<\/p>\n<div class=\"row\">\n<div class=\"col-md-12 col-xs-12 col-print-12\">\n<p class=\"element element-paragraph\">\u201cIn thinking about critical infrastructure, the word \u2018infrastructure\u2019 itself sometimes, I think, causes some confusion,\u201d said Manfra. \u201cAnd when it was originally established it was around the notion of physical threats, counterterrorism, etcetera, and how are we actually protecting the asset, the infrastructure itself from somebody who might want to sabotage that building or use that infrastructure itself to destroy another infrastructure.\u201d<\/p>\n<\/div>\n<\/div>\n<div class=\"row\">\n<div class=\"col-md-12 col-xs-12 col-print-12\">\n<p class=\"element element-paragraph\">Instead internet connected devices and systems constitute essential services within parts of the critical infrastructure.<\/p>\n<\/div>\n<\/div>\n<div class=\"row\">\n<div class=\"col-md-12 col-xs-12 col-print-12\">\n<p class=\"element element-paragraph\">\u201cIt\u2019s not just about the infrastructure, it\u2019s about \u2018what are the critical services and functions that American citizens, residents and increasingly, because of the multinational nature of some of our companies, globally that we depend upon?\u2019\u201d said Manfra.<\/p>\n<\/div>\n<\/div>\n<div class=\"row\">\n<div class=\"col-md-12 col-xs-12 col-print-12\">\n<p class=\"element element-paragraph\">She added that she divides the cybersecurity problems posed by IoT into three categories: IoT as vulnerable endpoints on a critical infrastructure\u2019s network, consumers buying unsecured IoT devices that could be conscripted into a denial of service or botnet campaign, and IoT devices imbedded in cars or healthcare tools that pose a life-threatening vulnerability.<\/p>\n<\/div>\n<\/div>\n<div class=\"row\">\n<div class=\"col-md-12 col-xs-12 col-print-12\">\n<p class=\"element element-paragraph\">\u201cI think that\u2019s a very different set of issues,\u201d Manfra said.<\/p>\n<div class=\"row\">\n<div class=\"col-md-12 col-xs-12 col-print-12\">\n<p class=\"element element-paragraph\">\u201cMore and more things are connecting to each other, and we\u2019re becoming more and more reliant on that connectivity,\u201d said Davis. \u201cAnd so I think that what that\u2019s going to result in is difficulty in prioritization of effort.\u201d<\/p>\n<\/div>\n<\/div>\n<div class=\"row\">\n<div class=\"col-md-12 col-xs-12 col-print-12\">\n<p class=\"element element-paragraph\">James Scott, senior fellow at the Institute for Critical Infrastructure Technology, said that a cybersecurity vetting system, much like how products are rated for energy efficiency, could solve the problem of consumers buying unsecured devices.<\/p>\n<\/div>\n<\/div>\n<div class=\"row\">\n<div class=\"col-md-12 col-xs-12 col-print-12\">\n<p class=\"element element-paragraph\">\u201cOne of the easiest ways to manage that is an EnergyStar-type approach, so you have the device, you have a QR code, you scan your phone over the QR code. That then feeds back to a dynamic database that\u2019s operated by machine learning and artificial intelligence that calculates a score,\u201d said Scott.<\/p>\n<\/div>\n<\/div>\n<div class=\"row\">\n<div class=\"col-md-12 col-xs-12 col-print-12\">\n<p class=\"element element-paragraph\">Scott added that the critical infrastructure sectors most vulnerable to cyberattack, like healthcare and energy, tend to have \u201cFrankenstein IoT microcosms\u201d of unsecured devices.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p><strong>Fuente:<\/strong>\u00a0<em><a href=\"https:\/\/www.federaltimes.com\/smr\/cybercon\/2017\/11\/29\/iot-is-changing-the-meaning-of-critical-infrastructure\/\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/www.federaltimes.com<\/a><\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>La proliferaci\u00f3n de dispositivos de Internet vinculados a industrias cr\u00edticas como el transporte y la atenci\u00f3n m\u00e9dica est\u00e1 cambiando la perspectiva sobre lo que constituye&hellip; <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[23,29],"tags":[],"_links":{"self":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/2612"}],"collection":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2612"}],"version-history":[{"count":0,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/2612\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2612"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=2612"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=2612"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}