Risk and vulnerability management
Awareness of the risks and vulnerabilities present in customers’ OT/ICS networks may help them to plan and mitigate the associated risk.
An OT network with many assets and sensors that are successfully tracked and inventoried in the asset discovery needs to be analyzed for any vulnerabilities. Ideally, any vulnerabilities also need to be remediated before they are exploited by an attacker. The block diagram in Figure 4.6 depicts assets’ vulnerabilities being remediated:
Figure 4.6 – Vulnerability management for assets in the IoT/OT industry
Some of the techniques used by MDIoT for learning vulnerabilities include Deep Packet Inspection (DPI), Threat Intelligence (TI), Artificial Intelligence (AI), and ML.
MDIoT helps the IT team identify unpatched assets, device configuration issues, unauthorized applications, top attack vectors, open ports, unauthorized connections, and missing anti-virus and then...