2020年物联网威胁报告(英文)

2020 Unit 42 IoT Threat Report P a l o A l t o N e t w o r k s | U n i t 4 2 | I o T T h r e a t R e p o r t 2Table of ContentsExecutive Summary 301 IoT Security Landscape 4Organizations Lack the Tools to Discover and Secure IoT 5Enterprises Sit on a Time Bomb 6Healthcare Is in Critical Shape 7Basic Network Segmentation Best Practices Aren’t Followed 8Case Study: Conficker in Healthcare 902 Top IoT Threats 10Exploits, Password Attacks, and IoT Worms Top the Chart 11Unpatched Devices and Legacy Protocols: Means of Lateral Movement 12Threats Evolving to Specifically Target IoT Environments 13Case Study: Cryptojacking in the Wild 1403 Conclusion and Recommendations 15Take Steps to Reduce Risk 16Step 1: Know your risk and discover IoT devices on the network 16Step 2: Patch printers and other easily patchable devices 16Step 3: Segment your IoT devices across VLANs 17Step 4: Enable active monitoring 18Perfect Your IoT Strategy 19Best Practice 1: Think holistically, orchestrate the entire IoT lifecycle 19Best Practice 2: Expand security to all IoT devices through product integrations 20About 21Palo Alto Networks 21Unit 42 21Methodology 22 P a l o A l t o N e t w o r k s | U n i t 4 2 | I o T T h r e a t R e p o r t 3Executive SummaryAccording to a 2019 Gartner report, "By the end of 2019, 4.8 billion [IoT] endpoints are expected to be in use, up 21.5% from 2018." While the internet of things (IoT) opens the door for innovative new approaches and services in all industries, it also presents new cybersecurity risks. To evaluate the current state of the IoT threat landscape, the Unit 42 threat intelligence team analyzed security issues throughout 2018 and 2019 with the Palo Alto Networks IoT security product, Zingbox®, spanning 1.2 million IoT devices in thousands of physical locations across enterprise IT and healthcare organizations in the United States. We found that the general security posture of IoT devices is declining, leaving organizations vulnerable to new IoT-targeted malware as well as older attack techniques that IT teams have long forgotten. This report details the scope of the IoT threat landscape, which IoT devices are most susceptible, top IoT threats, and actionable next steps to immediately reduce IoT risk. IoT devices are encrypted and unsecured98% of all IoT device traffic is unencrypted, exposing personal and confidential data on the network. Attackers who’ve successfully bypassed the first line of defense (most frequently via phishing attacks) and established command and control (C2) are able to listen to unencrypted network traffic, collect personal or confidential information and then exploit that data for profit on the dark web.57% of IoT devices are vulnerable to medium- or high-severity attacks, making IoT the low-hanging fruit for attackers. Because of the generally low patch level of IoT assets, the most frequent attacks are exploits via long-known vulnerabilities and passwo

立即下载
信息科技
2020-04-11
paloalto
22页
1.8M
收藏
分享

[paloalto]:2020年物联网威胁报告(英文),点击即可下载。报告格式为PDF,大小1.8M,页数22页,欢迎下载。

本报告共22页,只提供前10页预览,清晰完整版报告请下载后查看,喜欢就下载吧!
立即下载
本报告共22页,只提供前10页预览,清晰完整版报告请下载后查看,喜欢就下载吧!
立即下载
水滴研报所有报告均是客户上传分享,仅供网友学习交流,未经上传用户书面授权,请勿作商用。
相关图表
“银河一号”宽带通信卫星
信息科技
2020-04-11
来源:通信行业专题报告:从频率维度看低轨宽带卫星网发展
查看原文
吉利卫星概念图 图 9:吉利卫星智能 AIT 中心
信息科技
2020-04-11
来源:通信行业专题报告:从频率维度看低轨宽带卫星网发展
查看原文
天启星座通信系统终端
信息科技
2020-04-11
来源:通信行业专题报告:从频率维度看低轨宽带卫星网发展
查看原文
OneWeb 构建的卫星通信生态 图 6:OneWeb 卫星制造工厂
信息科技
2020-04-11
来源:通信行业专题报告:从频率维度看低轨宽带卫星网发展
查看原文
鸿雁卫星星座通信系统
信息科技
2020-04-11
来源:通信行业专题报告:从频率维度看低轨宽带卫星网发展
查看原文
太空探索公司星链项目卫星 图 3:OneWeb 卫星状况
信息科技
2020-04-11
来源:通信行业专题报告:从频率维度看低轨宽带卫星网发展
查看原文
回顶部
报告群
公众号
小程序
在线客服
收起