logo
CyberVision
logo
  • Home
  • About
  • Solutions
    • WithSecure Corporate
    • F-Secure Consumer
  • Resources
    • Articles
    • Cybervision Humour
    • eBooks
    • Glossary of Terms
    • ID Theft Checker
    • Infographics
    • Local Threats
    • Useful links
    • Useful online security tips
    • Videos
    • Webinars
    • Whitepapers
  • Press
    • Newsletters
      • Cyber Security Bulletin
      • Cybervision Partner Newsletter
    • Local News
    • International News
  • Threats
  • POPIA
    • FAQ’s
    • Use RADAR to help comply
  • Contact
  • Blog
Business Security
25th January 2019 by CyberVision 0 Comments 3354 Views
25th January 2019 by CyberVision in Business Security

IoT vs ICS security

IoT (Internet of Things) and ICS (Industrial Control Systems) are similar but very different.  IoT security is the technology area concerned with safeguarding connected devices and networks in the IoT. ICS security is the area of concern involving the safeguarding of industrial control systems, the integrated hardware and software designed to monitor and control the operation of machinery and associated devices in industrial environments. By allowing devices and machinery to connect to the internet opens them up to a number of serious vulnerabilities if they are not properly protected.

 

When ICS is placed in the same category as IoT, it combines the systems, purpose, value and risks of two totally separate communities. The primary source of risk for all internet-connected devices is the fact that there are many sensitive things that happen in this world and that connecting those functions to networks inherently exposes them to the possibility of being exploited.

 

Cybersecurity is a more prevalent challenge for IoT devices with many commonly used IoT devices containing vulnerabilities. Hacking home networks could have important repercussions for personal privacy. However, if an industrial IoT system is compromised, which involves connecting sensors to critical infrastructure resources such as power plants and water management facilities, the repercussions would be more severe. ICS hacks usually result in millions of revenue being lost, people can be injured or killed and the result typically has an overall effect on livelihoods and economies. With this being said, ICS installations must meet far more demanding cybersecurity requirements before installations are approved for use.

 

The main unifying component between IoT and ICS is that their operation went from analogue to digital; from being isolated to connected. Once the similarities are acknowledged, it will then be easier to distinguish between the two concepts and apply the correct security measures accordingly.

0
Recommend
  • Facebook
  • Twitter
  • LinkedIN
  • Pinterest
Share
  • f-secure
  • f-secure cyber security
  • ICS
  • IOT
  • IoT vs ICS
Tagged in

Categories

  • Business
  • Business Security
  • F-Secure
  • F-Secure Life
  • Home Security
  • IoT & Technology
  • Online Marketing
  • Real life
  • Tech
  • Threats & Research

Recent Posts

  • F-Secure rises to 3rd Most Attractive Company for IT Students
  • F-Secure R&D discovers exploitable vulnerability in Apple’s macOS Gatekeeper
  • VMware vulnerability puts even more pressure on organizations relying on remote work
  • The cyber security risks of working from home
  • If your company data is breached, should you pay a ransom?

Archives

  • May 2021
  • April 2021
  • December 2020
  • April 2020
  • November 2019
  • October 2019
  • September 2019
  • August 2019
  • July 2019
  • June 2019
  • May 2019
  • April 2019
  • March 2019
  • February 2019
  • January 2019
  • December 2018
  • November 2018
  • October 2018
  • September 2018
  • August 2018
  • July 2018
  • June 2018
  • May 2018
  • April 2018
  • March 2018
  • February 2018
  • January 2018
  • December 2017
  • November 2017
  • October 2017
  • September 2017
  • August 2017
  • July 2017
  • June 2017
  • March 2015
  • February 2015

© CyberVision PTY Ltd | 2025 | All Rights Reserved.

View our Privacy Policy and Terms of Service.

logo