{"id":31935,"date":"2019-12-25T13:29:10","date_gmt":"2019-12-25T18:29:10","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?post_type=emagazine&#038;p=31935"},"modified":"2022-08-08T04:51:56","modified_gmt":"2022-08-08T08:51:56","slug":"edge-computing-cybersecurity","status":"publish","type":"emagazine","link":"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/edge-computing-cybersecurity\/31935\/","title":{"rendered":"What does the rise of edge computing mean for cybersecurity?"},"content":{"rendered":"<p>Everyone in enterprise IT is talking about <a href=\"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/transition-hybrid-cloud\/31649\/\" target=\"_blank\" rel=\"noopener nofollow\">transitioning to the cloud<\/a>. But now there\u2019s a new paradigm on the block \u2013 edge computing. And it\u2019s causing quite a stir in a world already facing a multitude of cyber-threats. So, what exactly is edge computing, and what does it mean for information security?<\/p>\n<p>First, a short history of business computing. Until the 1980s, businesses had barebones computers, also known as dumb terminals, connected to a mainframe, which would take care of computing workloads and data storage. Then along came personal computers, where the machine on your desk handled the computing workloads. Today, in-house servers and workstations are falling out of favor in business environments as decentralized computing takes over. Many businesses have migrated to the cloud to allow users to access centralized cloud computing services hosted by companies like Amazon and Google. In many ways, it\u2019s a lot like the mainframes of the old days, albeit on a bigger scale, thanks to the internet rendering geographical boundaries irrelevant, mostly.<\/p>\n<p>Today, \u2018dumb\u2019 terminals have made a comeback in the form of smartphones, tablets and other internet-connected devices, in which many computing workloads are handled in the cloud rather than the device itself. But at the same time, these devices are now orders of magnitude more powerful than the workstations of just a couple of decades ago. They\u2019re now capable of doing their own work.<\/p>\n<p>And now we have a new option. Edge computing brings those computing workloads and data storage back to local devices, much like when we first started using personal computers. But there are two fundamental differences: internet-enabled devices are more numerous and diverse than ever before and most of them are permanently connected to the internet.<\/p>\n<p>Edge computing represents a fusion of cloud and local computing in which the cloud is still retained for carrying and, in many cases, storing data while local internet-connected devices take care of the data processing. By 2022, some <a href=\"https:\/\/www.gartner.com\/smarterwithgartner\/what-edge-computing-means-for-infrastructure-and-operations-leaders\/\" target=\"_blank\" rel=\"noopener nofollow\">three-quarters of enterprise data will be processed outside the cloud<\/a>, so it\u2019s safe to say that it\u2019s more than just a passing trend.<\/p>\n<h2>Why are companies moving to edge computing?<\/h2>\n<p>The most immediate advantage of edge computing is speed. With cloud computing, data is often transferred over hundreds, or even thousands, of miles between the local device and the remote data center. This means that the effective processing speed of a cloud-based app is heavily dependent on the distance instructions have to travel to control it. The delay is known as latency, measured in milliseconds (ms). A latency of 20-40ms is about the best you can expect with today\u2019s cloud-hosted applications. But the more significant issue is delays caused by problems with interference or outdated protocols when the data processing takes place remotely. Response times will always be faster with local computing, not just because the laws of physics say so, but also because there\u2019s less scope for interference and rerouting issues.<\/p>\n<p>Although the performance difference is barely discernible in most business applications, other computing workloads aren\u2019t ideally suited to the cloud and likely never will be because of the inherent performance and latency constraints. These include bandwidth-intensive applications like real-time 3D rendering and the synchronization of massive amounts of data with online storage. Even with a 1GB internet connection, you can end up running into bandwidth problems. And that\u2019s before we take into consideration other factors like bandwidth hogs and interference. Let\u2019s not even get started on the painfully stingy data limits of many mobile providers.<\/p>\n<p>Internet speeds might be increasing all the time, but so are computing demands. Many cloud software providers are working hard to reduce bandwidth consumption and problems with high latency. Having to be online all the time is another source of frustration, particularly when it comes to computing on the move where connections might be intermittent. Fortunately, things are changing. For example, progressive web apps (PWAs) often provide a basic level of offline functionality. Google\u2019s Chrome OS, one of the most cloud-centric platforms of all time, now let\u2019s Chromebook users work offline.<\/p>\n<h2>Self-driving cars \u2013 the best example of computing on the edge<\/h2>\n<p>Perhaps the ultimate example of edge computing is <a href=\"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/cybersecurity-autonomous-vehicles\/28291\/\" target=\"_blank\" rel=\"noopener nofollow\">self-driving cars<\/a>. Given the importance of quick reaction times in a moving vehicle, there\u2019s no scope for delays due to latency or intermittent service outages. The numerous sensors that make up the system have to feed data, in real-time, into an onboard computer for local processing. At the same time, the responsibility to keep people safe shifts towards the company that makes the software, which makes centralized management a practical necessity. That\u2019s why self-driving cars need to be hooked up to the internet to receive critical updates and continuously feed data into the cloud for developers to improve the algorithm continually.<\/p>\n<h2>Does edge computing mean regaining or losing control over enterprise data?<\/h2>\n<p><img decoding=\"async\" class=\"aligncenter size-large wp-image-31937\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2019\/12\/25132833\/072_edge_computing_and_cybersecurity_02-1-1024x768.jpg\" alt=\"edge computing and cybersecurity\" width=\"1024\" height=\"768\"><br>\nHaving data processed locally while retaining the cloud as a way to transmit and store data potentially gives businesses more control over their customers\u2019 lives. While we may no longer have to worry about things like updates and maintenance with remotely hosted and managed systems, letting third parties decide which features our devices need places us in a precarious situation for privacy and security. The stakes are even higher for businesses, which need to ensure they meet the demands of compliance and customers\u2019 expectations to keep their data safe. While legislation like the EU\u2019s <a href=\"http:\/\/www.kaspersky.com\/gdpr\" target=\"_blank\" rel=\"noopener nofollow\">GDPR<\/a> aims to return control to the user, cybercriminals won\u2019t pay too much attention to regulatory compliance.<\/p>\n<p>Losing control is one of the most <a href=\"https:\/\/biztechmagazine.com\/article\/2017\/12\/4-reasons-why-some-organizations-lose-control-cloud\" target=\"_blank\" rel=\"noopener nofollow\">common fears<\/a> business leaders have about migrating to the cloud in the first place. The combination of cloud and edge computing introduces fresh concerns that businesses will end up surrendering control over their connected devices to third parties and potentially putting customer data at risk. Also, hackers who gain access to the device via the cloud may be able to steal the data stored on them. This is already manifesting itself in the consumer world, with platforms like <a href=\"https:\/\/www.theguardian.com\/technology\/2019\/jul\/26\/apple-contractors-regularly-hear-confidential-details-on-siri-recordings\" target=\"_blank\" rel=\"noopener nofollow\">Apple\u2019s Siri reportedly recording people\u2019s conversations<\/a>.<\/p>\n<p>With IoT (internet of things) leading to a massive uptake of smart internet-connected devices, ranging from in-store beacons to remote-controlled HVAC (heating, ventilation and air conditioning) systems, the risk continues to grow.<\/p>\n<p>Whether your data is stored locally or on the cloud, if hackers access your credentials, the risk of a breach is equal. But additionally, edge computing expands the potential attack surface by having sensitive data stored and processed across a more extensive array of systems. It gets much harder, even to the point of becoming a practical impossibility, to protect ubiquitous computing environments at scale, simply because the footprint grows too large. A recent study by Tech Republic found that <a href=\"https:\/\/www.techrepublic.com\/article\/66-of-it-teams-view-edge-computing-as-a-threat-to-organizations\/\" target=\"_blank\" rel=\"noopener nofollow\">two-thirds of IT teams considered edge computing as more of a threat<\/a> than an opportunity, mainly because of this dramatically increased endpoint attack surface.<\/p>\n<blockquote><p>If someone has physical access to a device, that device is no longer secure. Losing control of devices empowered with edge computing technology can expose vastly more customer data and intellectual property than losing control of other types of devices.<\/p>\n<cite><p><strong>The Top Five Emerging Technologies Security Leaders Need To Prepare For, 2018<\/strong><\/p><p>Forrester<\/p><\/cite><\/blockquote>\n<p>The stakes are high with edge devices, and even more so with consumer-grade technology. To start with, businesses must be mindful about which suppliers they choose \u2013 consumer-grade tech is often a no-go for a start, which is a challenge for smaller firms <a href=\"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/small-business-cybersecurity\/29177\/\" target=\"_blank\" rel=\"noopener nofollow\">where one in four use it for their data security<\/a>. They also need to stop putting total trust in basic <a href=\"http:\/\/www.kaspersky.com\/business\" target=\"_blank\" rel=\"noopener nofollow\">endpoint security<\/a> measures like passwords and perimeter defenses. Business leaders need to expand security capabilities to all edge devices. This includes encryption of data both at rest and in transit, changing default passwords and maintaining control through a centralized management dashboard that governs how devices interact with the computing environment.<\/p>\n<h2>Do you need the cloud for everything?<\/h2>\n<p>The terms edge computing and the internet of things are often used interchangeably, though they\u2019re not the same thing. An edge computing device doesn\u2019t necessarily have to be connected to the internet at all times, or even at all. Instead, it might be connected only to an internal network, which could be used in industrial or other business environments. By definition, these devices are meant to retain some or even all functionality offline. That means companies can reduce risks by disallowing direct connections between edge devices and the cloud unless they\u2019re necessary for performing critical functions. Then, the data should be protected behind multiple layers of security such as encryption and multi-factor authentication.<\/p>\n<p>To that end, done right, edge computing can be beneficial, rather than detrimental, to security.<\/p>\n<p><em>Article reflects the opinions of the author. Published in 2019.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Edge computing brings computing power and data storage back from the cloud to local devices, but what does it mean for cybersecurity?<\/p>\n","protected":false},"author":2703,"featured_media":31936,"template":"","coauthors":[4311],"class_list":{"0":"post-31935","1":"emagazine","2":"type-emagazine","3":"status-publish","4":"has-post-thumbnail","6":"emagazine-category-internet-of-things","7":"emagazine-category-infrastructure","8":"emagazine-tag-data-security","9":"emagazine-tag-edge-computing","10":"emagazine-tag-internet-of-things"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/edge-computing-cybersecurity\/31935\/"}],"acf":[],"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/emagazine\/31935","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/emagazine"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/emagazine"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2703"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/31936"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=31935"}],"wp:term":[{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/coauthors?post=31935"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}