Page 47 - EE|Times Europe Magazine - December 2020
P. 47

EE|Times EUROPE   47




        OPINION | SECURITY
                                                                                Think like hackers who try to physically
        Know Your Adversary:                                                    break into sites.
                                                                                Gaining physical access to a workplace can be
                                                                                detrimental to a company’s secrets and much
        Think Like a Hacker                                                     more. Site security establishes physical pro-
                                                                                tection of the company premises. Although
                                                                                there are plenty of measures to restrict access,
                                                                                attackers are determined and may attempt to
        By Lars Reger                                                           break or sneak into offices or production sites.
                                                                                  Some attackers may apply social engi-
                                                                                neering tactics to manipulate employees
                            The pandemic has shuffled millions of people out of buildings and   into divulging confidential information that
                            home offices, forcing them to work, shop, and socialize online.   would allow them to gain physical access to
                            During this radical societal shift, the security ecosystem has   a building. These can range from following
                            noted an uptick in cyberattack reports. Even before the pandemic,   or “tailgating” to blackmail or even simply
                            IoT devices that collected and shared enormous amounts of data   exploiting someone’s laziness, curiosity, or
                            were prime hacking targets, as well as entry points for scalable   friendliness and willingness to help.
                            and lucrative attacks. The pandemic has seemingly heightened   An attacker may patiently wait at the
                            the attractiveness of hacking.                      entrance of a workplace for an opportunity to
                              Security is constantly evolving, as most security experts will   steal an access card that gets them through
        tell you. The more barriers that are added, the more sophisticated the attacks become to   the gates. Or the attacker may try to take
        breach them. To complicate matters, there’s no single profile of an attacker. Some are “lone   advantage of situations when fewer people
        wolves”; others work within tightly integrated teams. Hackers’ motivations also vary. Some   are around, or when people are likely more
        try to find vulnerabilities as if they were working to solve hard-to-crack puzzles. Others ini-  tired after lunch and enter with a crowd into
        tiate an attack to steal data and money to enrich themselves and their gangs. Hackers’ skills   a secure area. Hackers have been known to
        are as wide-ranging as their software and hardware tools are sophisticated.   drop a company-branded USB stick with
          To guard against these attacks, many organizations gravitate toward structure and rules.   malicious content installed on it into a com-
        Unfortunately, attackers are difficult to predict. Seldom following any type of set structure,   mon area. An employee might later pick it up
        attacks are as diverse and creative as the individuals who perpetrate them. What can be done   and plug it in, hoping to identify its owner
        in such a set of circumstances?                                         and return it. Such attacks can shut down a
          NXP Semiconductors is very much involved with developing products that meet cyber-  single computer and, if left undetected, even
        security standards and creating the best practices needed to implement and test those   affect entire systems.
        solutions. This results in the foundation that our customers use to build secure products.
        Ensuring that our employees understand the threats and are equipped to address them is a   At a foundational level,
        high priority.
                                                                                companies should provide
        ‘SECURITY SCHOOL’                                                       IT security training to all
        At NXP, we’ve set out to help our employees understand their security environment and under-
        stand the adversaries they face. We want these developing experts to think like hackers.  employees, with the common
          With this mindset, NXP established a “Security School” to teach employees how to rec-
        ognize attack surfaces, become more fluent in the vocabulary of cybersecurity, and gain a   understanding that a
        foundational understanding of cryptography, security implementations, and system security.   company is only as safe as its
        The goal was to become more attuned to the nuances of security and to train our team mem-
        bers to recognize common behaviors and patterns.                        weakest link.
          We recognize that not many companies can put together the type of training we’ve assem-
        bled for our employees, but there are some general guidelines that can help teams improve   Training that emphasizes the importance of
        their security posture.                                                 securing physical environments is particularly
                                                                                crucial for companies that build highly sen-
        Think like hackers who attempt to break into IT.                        sitive or regulated products and must follow
        These hackers may enter a system by “riding” on a data packet through an internet cable or via   certification procedures. At NXP, the audits
        a wireless antenna. They may try to mount sophisticated hacks to control and manipulate IT   that we achieve and maintain, including
        infrastructures and systems to steal confidential information about customers, employees, and   Common Criteria and Federal Information
        intellectual property.                                                  Processing Standards (FIPS) certification,
          At a foundational level, companies should provide IT security training to all employees,   extend to how the staff is trained and how
        with the common understanding that a company is only as safe as its weakest link. The central   products are designed.
        question that underpins this basic training is: What is IT security? The focus must be on the   It’s not just the content of the training
        general principles and practices of cybersecurity — starting with password and email security,   that’s important but also the way it’s
        document classification and encryption, and a full understanding of phishing scams and other   delivered. Immersive in-person experiences
        common threats.                                                         where mistakes are allowed often result in
          A culture of security teamwork should be fostered, similar to team sports. Employees should   learning that “sticks” and is better-
        develop a team mindset that recognizes that an adversary scores when a weakness is spotted   remembered. At NXP, we’ve used an “escape
        and that every individual is essential to IT security. Employees should learn how to identify   room” scenario that requires trainees to
        and avoid scams and phishing attempts, use application security, and apply general advice to   think like a hacker. In this format, a team of
        secure their everyday work environment.                                 employees must find the way out of a room by

                                                                                   www.eetimes.eu | DECEMBER 2020
   42   43   44   45   46   47   48   49   50   51   52