Applied cyberimmunity: What is it?
#1
Lightbulb 
Quote:
[Image: applied-cyberimmunity-featured.jpg]

What does our concept of cyberimmunity mean in practice? Setting aside copious debate about the future of cybersecurity as an industry and about the possible ways it may develop — the philosophy of cybersecurity — Eugene Kaspersky spoke about the application of cyberimmunity last week at the Kaspersky Industrial Cybersecurity Conference 2019.

The essence of cyberimmunity is to employ a level of protection such that the cost of an attack on a company exceeds the costs of possible damages. Nowadays, no serious cybersecurity expert can give a 100% protection guarantee. At the current level of information technology development, everything can be “hacked” — the only question is how much effort attackers are willing to expend. Therefore, the only way to avoid an attack is to make it economically unprofitable to potential attackers.

Of course, doing so is not easy. The main barrier here is that most modern information systems were originally built without cybersecurity in mind, so they contain flaws that tend to be covered with suboptimal solutions. The problem is particularly pervasive in industrial cybersecurity. That does not mean that we advocate eliminating everything old and designing new systems from scratch, but we definitely believe new systems must rest on “Secure by design” principles.

Cyberimmunity in industrial environments

As one possible option for the practical implementation of cyberimmunity at critical infrastructure facilities, we see an IIoT gateway based on our Kaspersky OS. Our operating system is based on a microkernel architecture, operates in a protected address space following the “Default Deny” concept, and allows you to define business logic to the smallest detail. Thus, any actions not allowed by this logic are blocked automatically.

The system source code is available for examination by the customer. Logic is also prescribed by the customer. Thanks to this, the only real option to inflict any damage by the means of such a device is to bribe the customer and initially put a mistake in the logic. But if attackers had such an opportunity, then why would they need to hack it?

You can learn more about our operating system in 7 questions about 11-11, answered, in which Eugene Kaspersky describes the key features of the system, and the more technical What is a secure OS? by Andrey Dukhvalov, head of our Future Technology department and chief strategy architect. In addition, you can find information about our operating system on its website.
...
Continue Reading
Reply


Forum Jump:


Users browsing this thread: 1 Guest(s)
[-]
Welcome
You have to register before you can post on our site.

Username/Email:


Password:





[-]
Recent Posts
Android Security Bulletin—March 2026
Android Security B...harlan4096 — 11:13
Qualcomm unveils Wi-Fi 8 chip designed t...
Qualcomm has commi...harlan4096 — 11:10
Adobe Acrobat Reader DC 2025.001.21265
Adobe Acrobat Read...harlan4096 — 11:07
uBOLite 2026.301.2014 (already released ...
uBOLite 2026.301.2...harlan4096 — 11:06
NVIDIA GeForce Game Ready 595.71 driver
Highlights  Gam...harlan4096 — 11:05

[-]
Birthdays
Today's Birthdays
No birthdays today.
Upcoming Birthdays
avatar (44)gapedDow
avatar (38)snorydar
avatar (43)Hectorvot
avatar (51)knowhanPluts
avatar (39)Williamengiz
avatar (46)qaqapeti
avatar (44)battsourIonix
avatar (43)CedricSek
avatar (39)chasRex
avatar (43)slavrProck
avatar (45)Tyesharaike
avatar (49)TomeRerla
avatar (45)walllMIZ
avatar (41)oconyho
avatar (33)uteluxix
avatar (47)piafcflene
avatar (39)Matthewkah
avatar (51)tersfargum
avatar (50)alfreExept
avatar (38)Charlesfibre
avatar (42)napasvem
avatar (44)diploJeoca
avatar (38)francisnj3
avatar (43)artmaGoork
avatar (45)tukraNax
avatar (41)RichardCisee
avatar (40)ebenofit
avatar (38)ykazawu
avatar (41)ARYsahulatbazar

[-]
Online Staff
There are no staff members currently online.

>