Page 182 - Cyber Defense eMagazine December 2023
P. 182
obtain someone’s login details. Finally, we would realize that some of the IoT systems would not use any
protection, so the hackers would so easily get an access to that asset.
How to remain cyber safe?
In this modern time, it’s quite challenging to remain cyber safe. Through this learning material – we would
discuss how it’s simple to organize some hacking attack, so the question here would be if there is any
chance to avoid a cyber breach. The fact is these sorts of attacks are happening anywhere and anytime
and the point is that you would accept that your IT asset got breached or not. As we said – it’s something
that is occurring constantly, so we would strongly recommend taking care about your cybersecurity and
try to follow the best procedures and policies in order to maintain the risk at an acceptable level. Also, it’s
significant to say that the good defense is about the proper risk management and the point is not how to
avoid the attack, but rather how to respond to so. Finally, it’s about the never-ending competition between
the force of defense and the force of attack.
The conclusions
At the end, we would show through this book’s chapter how it’s possible to exploit even mechatronics
systems being the part of ICS and so commonly the entire critical infrastructure. The mechatronics is only
one of the stages in a development and deployment of our technological improvements and today – it’s
combined with the IoT technology. The purpose of this chapter is to indicate that even mechatronics
systems got some weaknesses and the task of an expert’s community should be to try to overcome those
vulnerabilities and make much stronger and more reliable solutions.
About The Author
Milica D. Djekic is an Independent Researcher from Subotica, the Republic of Serbia.
She received her engineering background from the Faculty of Mechanical Engineering,
University of Belgrade. She writes for some domestic and overseas presses and she is
also the author of the books “The Internet of Things: Concept, Applications and Security”
and “The Insider’s Threats: Operational, Tactical and Strategic Perspective” being
published in 2017 and 2021 respectively with the Lambert Academic Publishing. Milica
is also a speaker with the BrightTALK expert’s channel. She is the member of an ASIS
International since 2017 and contributor to the Australian Cyber Security Magazine since 2018. Milica's
research efforts are recognized with Computer Emergency Response Team for the European Union
(CERT-EU), Censys Press, BU-CERT UK and EASA European Centre for Cybersecurity in Aviation
(ECCSA). Her fields of interests are cyber defense, technology and business. Milica is a person with
disability.
Cyber Defense eMagazine – December 2023 Edition 182
Copyright © 2023, Cyber Defense Magazine. All rights reserved worldwide.