What is the Root of Trust? PSA Certified explains the Root of Trust (RoT) as, “…the foundational security component of a connected device. While precise definitions can vary considerably, a RoT can be described as a set of implicitly trusted functions that the rest of the system or device can use to ensure security; it […]
Tag: IoT
What is Platform Security Architecture? Platform Security Architecture (PSA) is a security certification scheme for Internet of Things (IoT) hardware, software, and devices. It was created by Arm Holdings, Brightsight, CAICT, Prove & Run, Riscure, TrustCB, and UL as part of a global partnership. Arm Holdings first brought forward the PSA specifications in 2017 to […]
What is Interoperability? As cyberthreats are constantly emerging, interoperability is critical for defending systems from cyberattacks. Interoperability is the ability to pass information from one application to another, allowing them to work together. With the rise of Internet of Things (IoT) devices and interconnected devices, ensuring that all cybersecurity applications can communicate and share data […]
Extended Internet of Things
What is the Extended Internet of Things? The Extended Internet of Things (XIoT) is defined by Claroty as “a holistic umbrella term that encompasses all cyber-physical devices connected to the internet.”1 An organization’s XIoT can include a variety of cyber-physical systems serving various functions such as industrial (operational technology [OT] and industrial control systems [ICS]), […]
What is Cybersecurity for Operational Technology? Operational technology (OT) encompasses a broad range of programmable systems or devices that interact with physical environment (or manage devices that interact with the physical environment.)1 These systems and devices detect or cause a direct change through the monitoring and/or control of devices, processes, and events. Examples of OT […]
IoT Botnets
What are IoT Botnets? IoT. With the rising number of Internet of Things (IoT) devices, there is a concurrent rise in IoT botnet threats from cyberattackers. IoT refers to the interconnection and communication between internet-enabled physical devices. The growth of such devices has been explosive, as smart devices such as wearables, sensors, phones, cars, appliances, […]
What is Networked Medical Device Cybersecurity? The Internet of Things (IoT) is the interconnection and communication between internet-enabled physical devices. The growth of such devices has been explosive, as smart devices such as wearables, sensors, phones, cars, appliances, and household gadgets are becoming increasingly prevalent in more and more aspects of daily living. The proliferation […]
Botnets
What are Botnets? The term “botnet” is a portmanteau of the words “robot” and “network.” Botnets are networks of hijacked computer devices used by cyberattackers to carry out their cyberattacks. A botnet is controlled by a “bot herder” who operates the botnet infrastructure and uses the hijacked computers to launch cyberattacks that are designed to […]
IoT Security
What are the Security Threats to IoT Devices? The Internet of Things (IoT) is the interconnection and communication between internet-enabled physical devices. The growth of such devices has been explosive, as smart devices such as wearables, sensors, phones, cars, appliances, and household gadgets are becoming increasingly prevalent in more and more aspects of daily living. […]