One of the coolest things about being in today's internet is that our universe is filled with all of these amazing devices that I'm going to call static host. Now, you might also want to use the term Internet of Things. But it basically boils down to those zillions of devices out there that have some form of embedded operating system. And they also have some type of network awareness. So gosh, that could go from a Google Home box to a nest thermostat to a home router to a game controller, there are so many things out there that fit underneath that criteria. Now, a lot of people would argue that mobile devices are static hosts.
They certainly have a specific operating system. And it's also stored on firmware, and they're very much internet aware. However, these are kind of general purpose devices. So when we're talking about a static host, usually the best idea is to think about a device that's designed to do a specific thing. So So there are arguments for mobile devices being static hosts. However, I'm going to save all that for their own episode.
And we can go into the security of mobile devices in great detail. But there's lots of static hosts all around us. I mean, look what I got right in front of me here, I've got a wireless access point. I've got a nice switch here got an old but good router right in front of me, I've got a network aware printer right here. All of these are single purpose devices whose job is to do whatever they're supposed to do. They are network aware, very much network aware.
And they have some form of operating system stored on some kind of firmware. So these are all static hosts. Now, I'm not done yet. Let's keep going here. Let's take it up to more of an industrial level, and talk about some of the stuff that we see for example, industrial control systems. Everything we do when it comes to industrial anything these days, usually means you've got some kind of machine some kind of something with a computer that is network aware.
That is single purpose who is going to control that thing. To make it do whatever it wants to do. So I don't care if you're baking bread or making motherboards, there's invariably going to be some type of industrial control system. Now probably one of the more famous industrial control systems is heating, ventilation and air conditioning systems or HD AC. Pretty much any office building any industrial building today has an HD AC system. And all of that is powered by some type of specialized computer whose only job is to keep us warm or to keep us cool.
Now, we can even take it one step further than that. What I want to do is take the idea of industrial control and take it out over long distance. We have a lot of situations, railroads, oil pipelines, electrical distribution systems that require industrial controls, but because of their physical distances involved, they actually go into a whole new class of devices that we call supervisory control and data acquisition systems or skate up. So SCADA systems are pretty much ICS But the only big differences is they usually have to have some kind of like a cellular LAN connection, or something like that they have a lot of autonomy to make sure that they can do whatever they have to do. So there is a lot of stuff out there that we have to deal with when it comes to static hosts. So the big question is, is how do we secure them?
The biggest challenge to securing static hosts is understanding that in many ways, they're like any other type of host. And in many ways, they're not. So first of all, they act a lot like any regular host in that just like regular Windows system. For example, I will have user accounts with passwords. This has a user account with passwords, and invariably, it's going to have some default user account password. You know what, you probably want to change that.
Also like a regular host, you want to turn off unnecessary services. This particular router right here has a built in telnet server which I don't like to have turned on as an SSH server which is fine with me. So I make sure to turn off that telnet server. So the first thing you're going to do when you're dealing with the static host is think about that static host as a regular host. So there's a lot of things that you can take care of. However, the other problem with static hosts is that it doesn't act like a regular host.
In many ways. I don't have any Windows update that comes with this that automatically updates the built in operating system. I don't have any anti malware on this guy that allows me to make sure I'm not being corrupted by something. So when you have static hosts in your life, you're going to spend a lot of time monitoring your network, monitoring what's going on out there and making firmware updates. Hopefully, a lot voltage depends on the device, you run into a lot of interesting problems. Like for example, a very popular brand of home routers, people discovered fairly recently you could just type something into a screen and it would automatically allow you to take full control of them.
One injection attack. But it's because I watched the news and I discovered something like that. Also, this is a Cisco device, I tend to live on the Cisco sites, always watching for particular problems for any piece of firmware that needs an update. And then I'll go ahead and do those updates. And in 99% of the cases, it's a manual thing that you have to watch manually. Now.
That's great. But there's a lot of aspects about this device that you're not gonna be able to do anything about, for example, there is no anti malware built into the Cisco router. There are things I'm going to have to do to protect this. And I can't do it on the device itself. So I start to create layers of protection around it, or what we call defense in depth. And the best way to do defense in depth is through network segmentation.
Let me show you what I mean. So here's Mike's bread baking company, and I've got a big industrial control system where I make lots of delicious bread Now, what I need to do is perform networks segmentation here to give myself defense in depth. For example, here I have all of these bread baking machines, what I'm going to do is separate these bread making machines from the rest of my network using VLANs. In that way, I'm making sure that I get good control. And I can even put a firewall between the separate VLANs to make sure the traffic that I don't want to have going between these two will take care of it. Now, if I wanted to scale this up a little bit, let's just say I've got Mike's pipeline here.
So instead of an ICS, now I've got a SCADA system. So here's my pipeline with a few different terminals along 1000 mile pipeline. What I can do in this situation is that if any of these systems need to phone home or if I need to talk to them, I can go ahead and use a VPN network to allow me to talk to these guys with a high degree of security. You're going to see questions on the exam about static host. Remember a few things though, and you shouldn't have any trouble number one, treat a static host like any other regular host at first, but then Secondly, if there are unique aspects to that host, don't be afraid to throw in some really good network segmentation to protect your static hosts from the mean outside world.