The Whole IoT Is At Risk From Itself

The Internet of Things—the vast, interconnected, computer ecosystem of today—has reached a point where it is so complex, so multifaceted, has so many architects, and so many international studies embedded in it that the danger has escaped. to himself?

Will the electrical grid, the financial system, or the air traffic control system not be affected by the hand of a malicious hacker, but because the system – which is now a system of systems – has become a very subtle threat?

Worse, as phone speeds increase with 5G, will that system implosion accelerate with devastating consequences?

Will this technological meltdown be triggered from within by a long-forgotten code, sensor or minute product at vital, load-bearing points in this system?

This type of disaster is known from the complexity of “emergent behavior.” remember that concept. Chances are, you’ll hear a lot about it going forward.

Emergent behavior occurs when various objects or substances come together and trigger a reaction that cannot be known or predetermined.

Robert Gardner, founder and principal at New World Systems Technology and a consultant to the National Security Agency, tells me that computer ecosystems are highly susceptible to emerging behaviors in the complex so-called adaptive systems that is today’s cyberworld. It is a world that has been built over time with new layers of complexity added unwillingly by computation, and what has been demanded of it has become a huge and impregnable structure, beyond the scope of today’s architects and minds; including cybersecurity aficionados.

At the time of creation

Gardner, in my opinion, is worth listening to, if you will, in the beginning. At least he was hands-on and working on computer development, starting in the 1970s when he helped build the first supercomputers and consulted with various national laboratories, including Lawrence Livermore and Los Alamos. It has also played a key role in the development of today’s cloud-based financial computing infrastructure, known as “fintech”.

Gardner says of emergent behavior in complex systems, “they cannot be predicted by examining the individual elements of the system, since they are generated by the whole system – a perfect storm that conspires to produce disaster.”

The new adversary is complicated, says these giant virtual systems.

Gardner adds, “The complexity of the adversary does not require outside help; it can be brought about by minor failures, failures, limitations or equipment, or instabilities of fear in the normal operation of the system.

“Current threat detection software does not seek or detect these system conditions, leaving them very vulnerable.”

Gardner gives two examples where the reasoning fails. The first example is when a tree branch that fell on a power line in Ohio caused a blackout across Michigan, New York, and Canada. The system became a problem: Berserk went ahead, and 50 million people lost their power.

Another example of what is called “counterparty risk” is the release of Lehman Brothers, the giant of Wall Street. This happened when a single failure in the complex system started the implosion of the entire structure.

Not evil actors

Of whom Gardner says, there were no evil actors to defend; the complex, heterogeneous nature of the systems itself led to emergent behavior.

After all, best practices in cyber hygiene won’t protect against disaster. their enemies were bound. A useful note.

& worse danger, according to Gardner.

It’s bad 5G: super-expensive phone and data systems are now being deployed across the country. It will come in what are called crusts, but you can read the steps.

· Hacking is one thing that is being built now: it is faster than today’s 4G, which today’s phones and data use. Mobile broadband features.

Cutting the two, which is called “machine to machine”, is still faster.

Secretly, the three will move huge amounts of data at astonishing speeds, which, if the data is harmful to the system and happens in an unidentifiable place, represents a threat to the entire tranche of human activity.

Self-destructing machines will get away with 5G’s three-way cut to speeding up bad information through their systems and connected systems. Tech Armageddon.


Also Read :  ‘Artificial General Intelligence’ is next phase of AI

Leave a Reply

Your email address will not be published.

Related Articles

Back to top button