Page 182 - Cyber Defense eMagazine December 2023
P. 182

obtain someone’s login details. Finally, we would realize that some of the IoT systems would not use any
            protection, so the hackers would so easily get an access to that asset.



            How to remain cyber safe?

            In this modern time, it’s quite challenging to remain cyber safe. Through this learning material – we would
            discuss how it’s simple to organize some hacking attack, so the question here would be if there is any
            chance to avoid a cyber breach. The fact is these sorts of attacks are happening anywhere and anytime
            and the point is that you would accept that your IT asset got breached or not. As we said – it’s something
            that is occurring constantly, so we would strongly recommend taking care about your cybersecurity and
            try to follow the best procedures and policies in order to maintain the risk at an acceptable level. Also, it’s
            significant to say that the good defense is about the proper risk management and the point is not how to
            avoid the attack, but rather how to respond to so. Finally, it’s about the never-ending competition between
            the force of defense and the force of attack.



            The conclusions


            At the end, we would show through this book’s chapter how it’s possible to exploit even mechatronics
            systems being the part of ICS and so commonly the entire critical infrastructure. The mechatronics is only
            one of the stages in a development and deployment of our technological improvements and today – it’s
            combined with the IoT technology. The purpose of this chapter is to indicate that even mechatronics
            systems got some weaknesses and the task of an expert’s community should be to try to overcome those
            vulnerabilities and make much stronger and more reliable solutions.



            About The Author

            Milica D. Djekic is an Independent Researcher from Subotica, the Republic of Serbia.
            She received her engineering background from the Faculty of Mechanical Engineering,
            University of Belgrade. She writes for some domestic and overseas presses and she is
            also the author of the books “The Internet of Things: Concept, Applications and Security”
            and  “The  Insider’s  Threats:  Operational,  Tactical  and  Strategic  Perspective”  being
            published in 2017 and 2021 respectively with the Lambert Academic Publishing. Milica
            is also a speaker with the BrightTALK expert’s channel. She is the member of an ASIS
            International since 2017 and contributor to the Australian Cyber Security Magazine since 2018. Milica's
            research efforts are recognized with Computer Emergency Response Team for the European Union
            (CERT-EU), Censys Press, BU-CERT UK and EASA European Centre for Cybersecurity in Aviation
            (ECCSA). Her fields of interests are cyber defense, technology and business. Milica is a person with
            disability.









            Cyber Defense eMagazine – December 2023 Edition                                                                                                                                                                                                          182
            Copyright © 2023, Cyber Defense Magazine. All rights reserved worldwide.
   177   178   179   180   181   182   183   184   185   186   187