Advertisement

The Impact of IoT on Cybersecurity


The field of cybersecurity is, at its root, a game of chase. IT security experts are taxed with keeping data secure in an ever changing field. At one point, it was only computers, laptops, and servers that were a concern. That has changed over time to include smartphones, tablets, music players and a variety of other devices that connect to the internet.

Today, we have watches, appliances, home security systems, baby monitors, even cars that are connected to the internet. This connectivity means convenience for us. For Cybersecurity pros, these new developments mean that they have to work that much harder to plug holes and predict areas of weakness that hackers might exploit. In fact, according to this infographic by Towergate Insurance, the majority of data breaches and vulnerabilities occurred due to social engineering, phishing, water-holing, and ransomware - the common types of attacks, which IoT industry is particularly prone to as well.

Not an Issue to be Taken Lightly

Not long ago, hackers were able to take control of a jeep as it was being driven at 70 miles per hour. The hackers took over both the steering and the gear shifting capabilities rendering the driver helpless. The vehicle ended up in a ditch. Thankfully the driver lived to tell the tale. Things could have ended much differently. As new opportunities are presented to hackers, many of them become more brazen and careless. Certainly, most hackers are driven by the desire to earn money by exploiting the information that they manage to access, but there is no denying that many hackers act to do only one thing. That is to cause damage and create carnage to earn reputation or simply for personal pleasure.

Hacking And IoT

When it comes to computers, mobile phones, and tablets, users are much savvier today than they ever were before.They are less likely to fall prey to email phishing scams or to respond to emails that request that are attempts to gain access to information or hack accounts. Not that hackers aren't ever able to phish their way into these devices, but awareness of the problem exists. People don't know to be as vigilant with their connected appliances, cars, etc. Unfortunately, IoT has opened up new opportunities for spam and phishing attacks. In fact, one such attack was uncovered by ProofPoint. As a result of this, one of the opportunities and challenges facing cybersecurity experts is educating people of the dangers of phishing attacks on their internet connected things. Part of that is making people aware of the existence of danger. The other part is making them understand that they need to care.

Internet of Things Vulnerabilities

HP conducted a study on 10 IoT devices. The results of that study showed a total of 250 vulnerabilities across those 10 devices. Vulnerabilities included a lack of encryption, privacy issues, lack of security in web interfaces, weak or absent authorization protocols, missing software protection, and more. These vulnerabilities don't just impact individuals. Corporations that have IOT devices are also at risk and must take steps to protect the information that is transmitted to and from them.

Unusual Problems And Concerns Related to IoT

Imagine a hacker gaining access to and control of the devices in a home that connect to public utilities. Using this kind of cyber attack, they could potentially disrupt the delivery of those utilities to that home, or they could cause the home to consume much more than its share of resources. What happens then? What means does the utility company have to detect and mitigate something like this? Is it even their responsibility to do so?

Here's something else to consider. What happens when ownership of an IoT devices is transferred from one person to another? Is the seller obligated to give passwords or other access to the buyer? What if the seller is unable or unwilling to give that information? Should IoT come with a factory wipe option?

Clearly, IoT is an exciting thing, but these unusual problems and concerns make it clear that a lot of potential issues were likely not considered before many of these items went to market. For example, how can people who by IoT devices factory direct be ensured that they will get the latest in security patches? This means security experts have a host of new technical, policy-based, and even ethical concerns to deal with.

Conclusion

The world as a whole is becoming more and more connected. This is a great convenience to most of us. Wearable devices can be used to measure our health and wellness. We can use smartphones to control our thermostats and monitor our homes from afar increasing both efficiency and security. Repair people can even tap into our appliances to diagnose and in some cases perform fixes remotely. Unfortunately, each of these benefits comes with some significant security risks. In the future, data security experts will have a lot of work to do to mitigate these risks.