Internet of things and its cyber security implications.

 

-Himesh Kariyawasam

Introduction.

The Internet of Things is a network of physical objects or people known as "things" that are equipped with software, electronics, networks, and sensors to collect and share data. The aim of the Internet of Things is to expand internet access from mainstream devices such as computers, cell phones, and tablets to relatively simple devices such as ovens.

The recent rapid development of the Internet of Things and its ability to offer different types of services have made it the fastest growing technology, with a huge impact on social life and business environments. IoT has gradually permeated all aspects of modern human life, such as education, healthcare, and business, involving the storage of sensitive information about individuals and companies, financial data transactions, product development, and marketing. Because of this, it needs to have better security to protect IoT devices.

The security standards for the Internet of Things are the same as for every other IT system. As a result, preserving IoT protection necessitates maintaining the highest intrinsic value in both tangible (devices) and intangible artifacts (services, information, and data). The process of identifying threats to IoT systems and system vulnerabilities is essential for defining a comprehensive set of security requirements and determining if the security solution is safe against malicious attacks.

IoT technologies are commonly used in a wide range of businesses. The following are some of the most popular IoT applications:

  • Activity Trackers

  • Connect Health

  • Connected Cars

  • Parking Sensors

  • Smart City and home

  • Smart Outlets and supply chain

  • Smart Thermostats

Differences between the IoT and Traditional Internet

After the wide analysis, it can compare the current state of the art in both fields. Traditional Internet technology is mature; it has standards in different areas and search engines with which one can interact using natural language. As a consequence, anybody can use the traditional Internet without requiring any technological knowledge. However, the situation is very different in the IoT domain. Since the standardization movement is still in its early stages, data integration is performed when necessary or needed, necessitating the use of professional programmers to execute an application.

When comparing these two topics, it can point out as follows:

  • Traditional Internet content creates by humans but in IoT, it's done by machines.

  • IoT content consumed by pushing information and triggering actions, In Traditional Internet it’s done by request.

  • Traditional Internet content is combined using explicitly defined links but in IoT done it through explicitly defined operators.

  • The value of IoT is it can give Action and Timely information but on the Traditional Internet is do only answering questions.

  • Traditional Internet has done so far is content creating (HTML) and content consumption (search engines) but in IoT only the content creating.

Finally, it can be concluded that the traditional internet is the "Internet of People," sharing human knowledge, while the IoT is when "Things" or "physical real-time information" are included in the world's traditional internet.

Cybersecurity challenges created by IoT

One of the most important concerns about IoT is the security concerns that come with it. What are the major security problems that must be solved in order to fully benefit from this technology, it can point as followers;

  • Absence of a Robust Design

  • Botnet Attacks

  • Crypto mining

  • Data Integrity in Healthcare

  • Eavesdropping and Espionage

  • Insufficient Testing and Compliance

  • Rogue IoT Devices

  • Updating Issues and Lack of Awareness

  • Using weak passwords

Rising weaknesses in the system or its design (Vulnerabilities), exposure system details to the outside world (Privacy breach), Threats, and Attacks are caused to happened above security issues to the IoT devices.

IoT cybersecurity challenges resolving ways

As the number of connected IoT devices grows, it will become increasingly necessary to address their protection. Businesses can sustain a strong, connected ecosystem by partnering with the right experts for IoT implementation and security. However, the following measures can be taken to avoid these threats:

  • Authenticate the Devices and Avoid Launching Devices in a Rush

  • Beware of Latest Security Threats & Breaches

  • Develop Secured Apps

  • Secure the Network

  • Test the Hardware

  • Use API and PKI Security Methods, doing Data Encryption

  • Use Security Analytics Solutions

Conclusion

Needless to say, the advancement of IoT applications has reached new heights. The Internet of Things is rapidly taking over the world, changing the way people used to look at it. It is quickly becoming a central part of people's lives. Anything most humans have seen before is now having a full smart makeover, from your smartwatch to your smart house, smart trains to smart vehicles.

Cyber-attacks are nothing new in the IoT world, but as the IoT becomes more deeply ingrained in our lives and communities, it will be important to step up and take cyber security seriously. As a consequence, there is a pressing need to protect IoT, which has necessitated a thorough understanding of the risks and attacks against IoT infrastructure, as well as a strong understanding of how people can avoid them.

Reference

  • Boeckl, K., Fagan, M., Fisher, W., Lefkovitz, N., Megas, K., Nadeau, E., O'Rourke, D., Piccarreta, B. and Scarfone, K., 2019. Considerations for managing Internet of Things (IoT) cybersecurity and privacy risks. NISTIR 8228.

  • Folk, C., Dan C. Hurley, M., Wesley K. Kaplow, A., Star Consulting, P. and F. X. Payne, J., 2015. THE SECURITY IMPLICATIONS OF THE INTERNET OF THINGS. [ebook] The AFCEA International Cyber Committee White Paper Series, pp.1-24. Available at: <https://www.afcea.org/site/sites/default/files/files/AFC_WhitePaper_Revised_Out.pdf> [Accessed 8 April 2021].

  • Li, S. and Da Xu, L., 2017. Securing the Internet of Things. [ebook] Elsevier Science. Available at: <https://books.google.lk/books?id=uW1_CwAAQBAJ&dq=Internet+of+things+and+its+cybersecurity+implications&hl=en&sa=X&ved=2ahUKEwj-m7b-h5LwAhUp3jgGHalUA-MQ6AEwAXoECAIQAg> [Accessed 10 April 2021].

  • Weber, R. and Studer, E., 2016. Cybersecurity in the Internet of Things: Legal aspects. Computer Law & Security Review, [online] 32(5), pp.715-728. Available at: <https://www.sciencedirect.com/science/article/abs/pii/S0267364916301169> [Accessed 4 April 2021].

  • Ziegler, S., 2019. Internet of Things Security and Data Protection. [ebook] Springer, pp.1-191. Available at: <https://books.google.lk/books?id=Ws2NDwAAQBAJ&dq=Internet+of+things+and+its+cybersecurity+implications&source=gbs_navlinks_s> [Accessed 6 April 2021].

Post a Comment

0 Comments

❇️ KUBERNETES