Page 1201 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 1201

ability to disable sandboxing. This might improve performance of the
               browser slightly, but the risk is significant.







                   Botnets, IoT, and Embedded Systems


                  Attackers have traditionally infected desktop and laptop computers
                  with malware and joined them to botnets. While this still occurs,

                  attackers have been expanding their reach to the Internet of Things
                  (IoT).

                  As an example, attackers used the Mirai malware in 2016 to launch
                  a distributed denial-of-service (DDoS) attack on Domain Name
                  System (DNS) servers hosted by Dyn. Most of the devices involved
                  in this attack were Internet of Things (IoT) devices such as
                  internet-connected cameras, digital video recorders, and home-

                  based routers that were infected and added to the Mirai botnet.
                  The attack effectively prevented users from accessing many
                  popular websites such as Twitter, Netflix, Amazon, Reddit, Spotify,
                  and more.

                  Embedded systems include any device with a processor, an
                  operating system, and one or more dedicated apps. Some examples
                  include devices that control traffic lights, medical equipment,

                  automatic teller machine (ATM), printers, thermostats, digital
                  watches, and digital cameras. Many automobiles include multiple
                  embedded systems such as those used for cruise control, backup
                  sensors, rain/wiper sensors, dashboard displays, engine controls
                  and monitors, suspension controls, and more. When any of these
                  devices have connectivity to the internet, they become part of the

                  IoT.

                  This explosion of embedded systems is certainly improving many
                  products. However, if they have internet access, it’s just a matter of
                  time before attackers figure out how to exploit them. Ideally,
                  manufacturers will design and build them with security in mind
                  and include methods to easily update them. The Mirai DNS attack

                  indicates they haven’t done so, at least by 2016.
   1196   1197   1198   1199   1200   1201   1202   1203   1204   1205   1206