Tele-Talk新鲜的花,深入分析和观点从受人尊敬的行业领导者

隐藏的安全风险:物联网可以真正从外部威胁了吗?

尽管安全往往采取了后座在物联网技术的发展,制造商必须开始保护构建到他们的设备。

Srinivasan CR
Srinivasan CR 首席数字官塔塔通信
Not so long ago, computers and smartphones were the main tech devices for connectivity amongst consumers. In just a few years, this has changed drastically. Connected devices are everywhere \u2013 from healthcare\/fitness devices to connected home devices \u2013 there\u2019s even more forms when you consider connected devices for businesses. The advent of disruptive technologies like the Internet of Things is changing the way products and services are conceptualised, created, processed and delivered. The IoT technology is growing at a rapid rate as more consumers and businesses are waking up to the benefits offered by smart devices.<\/p>


Today, the IoT market comprises of everything from smart doorbells, connected kettles to children\u2019s toys. This is not only limited to smart home tech for consumers, IoT sensors are being increasingly used by businesses of all sizes across industries including healthcare and manufacturing as well. However, despite its life-enhancing and cost-saving benefits, IoT opens a back door to a security minefield and leaves a lot of us asking the question - is it even possible to secure the IoT?<\/p>


This was one of the themes discussed at this year\u2019s Mobile World Congress (MWC). IoT technology featured heavily at the trade show, with connected items ranging from a passenger drone to the next generation of smart city technology, and IoT security taking centre stage. One session focused on how blockchain might help to secure IoT devices in the future. Best known as the backbone of cryptocurrency Bitcoin, blockchain is a shared ledger where data is automatically stored across multiple locations. The indisputable digital paper trail makes it ideal for financial applications, but it could also be applied to IoT.<\/p>


IoT devices increase the amount of entry points into a home or business network, which in turn could give hackers access to devices such as computers that contain sensitive data. Using blockchain technology could reduce the risk of IoT devices being put at risk by a security breach at a single point. By getting rid of a central authority in IoT networks, blockchain would enable device networks to validate and protect themselves. For example, devices in a common group could potentially stop or alert the user if asked to carry out tasks that appear unusual, such as being commandeered by hackers to carry out Distributed Denial of Service (DDoS) attacks.<\/p>

IoT security and drones<\/strong><\/p>

Also highlighted at MWC was the importance of securing IoT technology for use by drones. Drone technology is a rapidly emerging sector within IoT and the risk of hacking could not only cause a data breach, it could also pose a major risk to public safety. Thanks to their versatile application and access to real-time data, commercial drones are used across a wide variety of sectors including agriculture, military, and construction and have even been used to deliver packages, while consumer drones have also grown in popularity in recent years. However, as with many IoT devices, security is often an afterthought leaving many drones vulnerable to hackers.<\/p>


If a drone\u2019s own telemetry data is accessed, hackers could take control of it while in the air. This could place people in physical danger if the drone was purposely crashed or hijacked to carry harmful substances such as explosives or chemical agents. A hacked drone could also be used for spying through on-board cameras, or malware could be installed enabling hackers to strip out sensitive data collected by the drone, including pictures and video.<\/p>

While there is an increasing amount of drone legislation being introduced, much of the focus is on air space and where drones are allowed to fly. However, the importance of securing the network that drones submit data on should not be underestimated.<\/p>

Why is securing IoT technology such a big challenge?<\/strong><\/p>

Securing IoT devices is challenging for a number of reasons. A rapidly increasing number of gadgets are being turned into smart devices and as manufacturers roll out new products more quickly, little priority is given to security. Eventually we could see almost every home device connected to the
Internet, not necessarily with any consumer benefit but instead geared towards data collection, which is incredibly valuable for manufacturers. A lack of awareness among consumers and businesses is also a major obstacle to security, with the convenience and cost-saving benefits of IoT tech appearing to outweigh the potential risks.<\/p>

Another challenge is securing not only the IoT devices but also the networks over which their data is transferred. In the past, businesses haven\u2019t always focused on building end-to-end security into the network. This is set to change as attitudes evolve, with 46 per cent of organisations ranking \u2018securing
IoT within the organisation\u2019 as a high priority for 2018, according to the Hiscox Cyber Readiness Report.<\/p>


What happens next?<\/strong><\/p>

So, is it really impossible to secure the Internet of Things? While it\u2019s certainly a challenge, the industry is developing new ways to protect IoT devices from increasingly sophisticated hackers, and there will be significant opportunities for those working in the IoT security space. Blockchain may well be part of the solution, though a group effort will be needed to ensure that IoT technology evolves in a way that is both beneficial to consumers and businesses and secure from hackers.<\/p>

Education is also key and makers of IoT devices, ISPs and the government must play a vital role in boosting awareness of IoT security among consumers and businesses. At a government level, it may also be necessary to provide education to boost the digital literacy of policymakers. More regulation
and standardisation is needed to ensure that IoT devices adhere to a certain level of security, while manufacturers must develop clear privacy policies for their IoT devices and ensure that consumers know how to adjust the security settings. Even simple steps such as not setting default passcodes as \u20180000\u2019 or \u20181234\u2019 could help keep devices more secure in the future.<\/p>

While security has too often taken a back seat in the development of IoT technology, manufacturers must begin to build protection into their devices. Network providers can also help address the IoT security threat by creating end-to-end infrastructure that meets industry-wide standards. Providers that offer a secure network will have a competitive advantage in the long run.<\/p>","blog_img":"","posted_date":"2018-06-12 15:12:08","modified_date":"2018-06-12 15:12:08","featured":"0","status":"Y","seo_title":"Hidden security risks: Can IoT be truly secured from external threats?","seo_url":"hidden-security-risks-can-iot-be-truly-secured-from-external-threats","url":"\/\/www.iser-br.com\/tele-talk\/hidden-security-risks-can-iot-be-truly-secured-from-external-threats\/3081","url_seo":"hidden-security-risks-can-iot-be-truly-secured-from-external-threats"}">

不久以前,电脑和智能手机的主要技术设备消费者之间的连通性。在短短几年中,这大大改变了。连接设备无处不在——从医疗/健身设备连接家庭设备,甚至还有更多的企业形式当你考虑连接设备。像的出现颠覆性技术互联网的事情是改变产品和服务的方式是概念化,创建、处理和交付。的物联网技术快速发展,越来越多的消费者和企业意识到智能设备提供的好处。


如今,物联网市场包括从智能门铃,水壶连接到儿童玩具。这不仅是局限于智能家居技术对于消费者来说,物联网传感器被越来越多的企业采用各种规模的行业包括医疗和制造业。然而,尽管其提高生活质量和节约成本的好处,物联网打开后门安全雷区,让很多人问这个问题——它甚至可以安全物联网吗?


这是一个讨论的主题在今年的全球移动大会(mvc)。物联网技术出现大量贸易展上,连接条目从一个乘客无人机智能城市的下一代技术,和物联网安全采取中心舞台。一个会话重点区块链如何帮助确保在未来物联网设备。最好的主干cryptocurrency比特币,区块链是一个共享的总帐数据自动存储在多个位置。无可争辩的数字文件线索使它理想的金融应用程序,但它也可以应用于物联网。


物联网设备增加入口点到一个家庭或商业网络,进而让黑客访问包含敏感数据的设备,如电脑。使用区块链技术可以降低物联网设备的风险置于危险的一个单点的安全漏洞。在物联网通过摆脱中央权威网络区块链将使设备网络来验证和保护自己。例如,设备在一个共同的组可能会停止或提醒用户如果要求执行任务,出现异常,如被黑客征用进行分布式拒绝服务(DDoS)攻击。

物联网安全与无人机

还强调了在mvc是保障物联网技术供无人机使用的重要性。无人机技术在物联网是一个正在迅速崛起的行业和黑客攻击的风险不仅可以导致数据泄露,它还可以对公共安全构成重大风险。由于通用的应用程序和访问实时数据,商业使用无人机在各种各样的行业包括农业、军事、和建筑甚至被用来提供包,尽管消费者无人机也在最近几年越来越流行。然而,正如许多物联网设备,安全往往是事后留下许多无人机容易受到黑客的攻击。


如果无人机的遥测数据访问,黑客可以控制它在空气中。这可能使人们在物理危险如果无人机是故意撞或劫持携带爆炸物或化学药剂等有害物质。黑客攻击无人机也可用于监视通过车载摄像头,黑客或恶意软件可以安装启用剔除敏感数据收集的无人机,包括图片和视频。

虽然有越来越多的无人机被引入立法,重点是空气的空间,允许无人机飞行。然而,网络安全的重要性,无人机提交的数据不应被低估。

为什么保护等物联网技术是一个巨大的挑战?

获得物联网设备是具有挑战性的原因很多。数量迅速增加的设备正在变成智能设备制造商更快推出新产品,小的是优先考虑安全。最终我们可以看到几乎每一个家庭设备连接
互联网,不一定与任何消费者受益,而是针对数据收集,这对制造商是非常宝贵的。缺乏意识的消费者和企业安全也是一个重大障碍,与物联网技术出现的方便和节约成本的效益大于潜在的风险。

另一个挑战是确保不仅物联网设备的网络数据传输。在过去,企业并不总是侧重于建立端到端安全的网络。这将改变态度的发展,46%的机构排名的保护
物联网在组织的2018年作为高优先级,根据Hiscox网络准备报告。


接下来会发生什么?

所以,真的是不可能安全物联网吗?虽然它是一个挑战,行业正在开发新的方法来保护物联网设备日益复杂的黑客,和将会有重大的机会对于那些工作在物联网的安全空间。区块链可能是解决方案的一部分,虽然一群努力将需要确保物联网技术的发展,既有利于消费者和企业从黑客和安全。

教育也很关键和物联网设备制造商、互联网服务提供商和政府必须发挥至关重要的作用,提高消费者和企业之间的物联网安全意识。在政府层面,也有必要提供教育来提高决策者的数字素养。加强监管
和标准化是必要的,以确保物联网设备坚持某种程度的安全,而制造商必须制定明确的隐私政策的物联网设备和确保消费者知道如何调整安全设置。即使是简单的步骤,如不设置默认密码为“0000”或“1234”可以帮助保持设备在未来更加安全。

尽管安全往往采取了后座在物联网技术的发展,制造商必须开始保护构建到他们的设备。网络供应商也可以帮助解决物联网安全威胁通过创建端到端基础设施,符合行业标准。提供者提供一个安全的网络将会有一个长期的竞争优势。

免责声明:作者的观点仅和ETTelecom.com不一定订阅它。乐动体育1002乐动体育乐动娱乐招聘乐动娱乐招聘乐动体育1002乐动体育ETTelecom.com不得负责任何损害任何个人/组织直接或间接造成的。

Not so long ago, computers and smartphones were the main tech devices for connectivity amongst consumers. In just a few years, this has changed drastically. Connected devices are everywhere \u2013 from healthcare\/fitness devices to connected home devices \u2013 there\u2019s even more forms when you consider connected devices for businesses. The advent of disruptive technologies like the Internet of Things is changing the way products and services are conceptualised, created, processed and delivered. The IoT technology is growing at a rapid rate as more consumers and businesses are waking up to the benefits offered by smart devices.<\/p>


Today, the IoT market comprises of everything from smart doorbells, connected kettles to children\u2019s toys. This is not only limited to smart home tech for consumers, IoT sensors are being increasingly used by businesses of all sizes across industries including healthcare and manufacturing as well. However, despite its life-enhancing and cost-saving benefits, IoT opens a back door to a security minefield and leaves a lot of us asking the question - is it even possible to secure the IoT?<\/p>


This was one of the themes discussed at this year\u2019s Mobile World Congress (MWC). IoT technology featured heavily at the trade show, with connected items ranging from a passenger drone to the next generation of smart city technology, and IoT security taking centre stage. One session focused on how blockchain might help to secure IoT devices in the future. Best known as the backbone of cryptocurrency Bitcoin, blockchain is a shared ledger where data is automatically stored across multiple locations. The indisputable digital paper trail makes it ideal for financial applications, but it could also be applied to IoT.<\/p>


IoT devices increase the amount of entry points into a home or business network, which in turn could give hackers access to devices such as computers that contain sensitive data. Using blockchain technology could reduce the risk of IoT devices being put at risk by a security breach at a single point. By getting rid of a central authority in IoT networks, blockchain would enable device networks to validate and protect themselves. For example, devices in a common group could potentially stop or alert the user if asked to carry out tasks that appear unusual, such as being commandeered by hackers to carry out Distributed Denial of Service (DDoS) attacks.<\/p>

IoT security and drones<\/strong><\/p>

Also highlighted at MWC was the importance of securing IoT technology for use by drones. Drone technology is a rapidly emerging sector within IoT and the risk of hacking could not only cause a data breach, it could also pose a major risk to public safety. Thanks to their versatile application and access to real-time data, commercial drones are used across a wide variety of sectors including agriculture, military, and construction and have even been used to deliver packages, while consumer drones have also grown in popularity in recent years. However, as with many IoT devices, security is often an afterthought leaving many drones vulnerable to hackers.<\/p>


If a drone\u2019s own telemetry data is accessed, hackers could take control of it while in the air. This could place people in physical danger if the drone was purposely crashed or hijacked to carry harmful substances such as explosives or chemical agents. A hacked drone could also be used for spying through on-board cameras, or malware could be installed enabling hackers to strip out sensitive data collected by the drone, including pictures and video.<\/p>

While there is an increasing amount of drone legislation being introduced, much of the focus is on air space and where drones are allowed to fly. However, the importance of securing the network that drones submit data on should not be underestimated.<\/p>

Why is securing IoT technology such a big challenge?<\/strong><\/p>

Securing IoT devices is challenging for a number of reasons. A rapidly increasing number of gadgets are being turned into smart devices and as manufacturers roll out new products more quickly, little priority is given to security. Eventually we could see almost every home device connected to the
Internet, not necessarily with any consumer benefit but instead geared towards data collection, which is incredibly valuable for manufacturers. A lack of awareness among consumers and businesses is also a major obstacle to security, with the convenience and cost-saving benefits of IoT tech appearing to outweigh the potential risks.<\/p>

Another challenge is securing not only the IoT devices but also the networks over which their data is transferred. In the past, businesses haven\u2019t always focused on building end-to-end security into the network. This is set to change as attitudes evolve, with 46 per cent of organisations ranking \u2018securing
IoT within the organisation\u2019 as a high priority for 2018, according to the Hiscox Cyber Readiness Report.<\/p>


What happens next?<\/strong><\/p>

So, is it really impossible to secure the Internet of Things? While it\u2019s certainly a challenge, the industry is developing new ways to protect IoT devices from increasingly sophisticated hackers, and there will be significant opportunities for those working in the IoT security space. Blockchain may well be part of the solution, though a group effort will be needed to ensure that IoT technology evolves in a way that is both beneficial to consumers and businesses and secure from hackers.<\/p>

Education is also key and makers of IoT devices, ISPs and the government must play a vital role in boosting awareness of IoT security among consumers and businesses. At a government level, it may also be necessary to provide education to boost the digital literacy of policymakers. More regulation
and standardisation is needed to ensure that IoT devices adhere to a certain level of security, while manufacturers must develop clear privacy policies for their IoT devices and ensure that consumers know how to adjust the security settings. Even simple steps such as not setting default passcodes as \u20180000\u2019 or \u20181234\u2019 could help keep devices more secure in the future.<\/p>

While security has too often taken a back seat in the development of IoT technology, manufacturers must begin to build protection into their devices. Network providers can also help address the IoT security threat by creating end-to-end infrastructure that meets industry-wide standards. Providers that offer a secure network will have a competitive advantage in the long run.<\/p>","blog_img":"","posted_date":"2018-06-12 15:12:08","modified_date":"2018-06-12 15:12:08","featured":"0","status":"Y","seo_title":"Hidden security risks: Can IoT be truly secured from external threats?","seo_url":"hidden-security-risks-can-iot-be-truly-secured-from-external-threats","url":"\/\/www.iser-br.com\/tele-talk\/hidden-security-risks-can-iot-be-truly-secured-from-external-threats\/3081","url_seo":"hidden-security-risks-can-iot-be-truly-secured-from-external-threats"},img_object:["","retail_files/author_1528795443_temp.jpg"],fromNewsletter:"",newsletterDate:"",ajaxParams:{action:"get_more_blogs"},pageTrackingKey:"Blog",author_list:"Srinivasan CR",complete_cat_name:"Blogs"});" data-jsinvoker_init="_override_history_url = "//www.iser-br.com/tele-talk/hidden-security-risks-can-iot-be-truly-secured-from-external-threats/3081";">