Cybersecurity Threats and Mitigation measures in Agriculture 4.0 and 5.0

Acrobat Cybersecurity threats and mitigation measures in agriculture 4.0 and 5.0
Author/Researcher: Chrysanthos Maraveas, Muttukrishnan Rajarajan, Konstantinos G Arvaniti, Anna Vatsanidou
Source: https://www.sciencedirect.com/

The primary aim of this study was to explore cybersecurity threats in agriculture 4.0 and 5.0, as well as possible mitigation strategies. A secondary method was employed involving narrative review in which many studies on cybersecurity were sampled and analyzed. The study showed that the main risks that increase cybersecurity threats to agricultural organizations include poor cybersecurity practices, lack of regulations and policies on cybersecurity, and outdated IT software. Moreover, the review indicated that the main cybersecurity threat in agriculture 4.0 and 5.0 involves denial of service attacks that target servers and disrupt the functioning of relevant smart technologies, including equipment for livestock tracking, climate monitoring, logistics and warehousing, and crop monitoring.

The analysis also revealed that malware attacks occur when hackers change the code of a system application to access sensitive farm-related data and may alter the operations of the digitized systems. Some of the impacts of cybersecurity breaches were noted to include data loss, reduced efficiency of digitized systems, and reduced food security. A crucial mitigation strategy against cybersecurity threats includes using advanced technologies such as artificial intelligence (AI), blockchain, and quantum computing to improve malware detection in Internet of Things (IoT) digital equipment and ensure faster response to any threats. The other mitigation measures include training employees on best cybersecurity practices and creating guidelines and regulatory standards on best cybersecurity practices. Read More

I Own Your Building (Management System)

Acrobat I Own Your Building (Management System)
Author/Researcher: Gjoko Krstic & Sipke Mellema
Source: https://applied-risk.com

Introduction: Not many people have noticed that the modern buildings have changed into industrial control systems. By embedding IP-based technologies throughout the buildings and by connecting sensors, controllers and supervisory software, building owners enjoy a low-cost management of their assets, with minimal staffing. Building Management Systems (BMS) monitor and control a building’s internal environment. They are used in various sectors, such as commercial, banking, industrial, medical, and even residential.

Unfortunately, it is observed that these panels are often accessible from the Internet, enabling also malicious parties to access the administrator’s dashboard. Multiple deployments of BMS solutions remain susceptible to basic cyber security
attacks, such as command injection, file uploads or privilege escalation. The execution of these attacks enables an unauthenticated attacker to access and manipulate doors, elevators, air-conditioning systems, cameras, boilers, lights, safety alarm systems in an entire building. Read More

Of Hacks & Keyloggers – Part 1

Of Hacks & Keyloggers…!!! “I don’t know what happened!; I don’t remember visiting any dodgy websites, downloading any weird apps, opening any suspicious emails or attachments, let alone links!, why I am receiving these sms & email notifications from my Bank!?!?” Sounds familiar right? Come to think of it, in most cases the unsuspecting victim is being honest. That being said, I just remembered something; a previous write up revolving around one of the methods used to carry out this type of attack. It can happen to anyone, in fact I was once a victim!

 

 

What is a keylogger? 

Read more