Friday, May 1, 2020

Issues of Iot Security Security Challenges

Question: Write about theIssues of Iot Securityfor Security Challenges. Answer: Introduction The Internet of Things is one of the most talked about topics in the workplace as well as outside too. The said concept has a very demanding impact on an individuals life as well as his way of working. However, the question as to what is IoT should be understood before issues related to its security are discussed. IoT basically helps connection of various devices with a switch which has an off and an on to the internet. By things, one means almost everything from mobile phones to washing machines to tea makers, lamp shades and such other things one can imagine of. The IoT helps to interchange information between devices with the help of rooted sensors. The growing usage of IoT has various advantages as it will help to transform the universe and the methodology they adopt to carry out their work. Due to IoT, various cars will be able to connect with each other and in turn also link with the smart city as well, such is the benefit it offers (Dickson, 2015). Background However, no benefit is alone and is always accompanied with varying risks due to an increased usage of connected devices which gives the various cyber criminals and attackers many more routes to enter the system and destroy or misuse it. Therefore it can be rightly interpreted that due to such an interconnection, if one device gets infected or entry is made, then it becomes very easy to enter the other devices which are connected to it. This would lead to endangering of crucial infrastructure that should otherwise be safeguarded. History has proved that IoT is also subject to security issues which has been highlighted due to the weaknesses imbibed in the communication software of devices which are connected to the crucial infrastructure for example personal computers used for work purpose and observation cameras has been targeted to enable unlawful admittance externally (Meola, 2016). The said report details about the various security threats to IoT. Security Challenges Posed By Iot There are various challenges posed by IoT which cannot be ignored. A decade ago people used to worry about securing the data saved on their computers and laptops, further five years down they started to worry about the safety of data in their android phones and presently, the shift has been seen into protecting of ones car and such other appliances which use IoT. First and foremost, the security challenge posed by IoT is the traditional challenges which have been posed by the standard and old aged computer systems (Valeiras, 2016). Such as the latest smart Tvs with features which gives access to the users to browse the internet, share pictures through social media which can possibly lead to putting the information stored in them at risk. The hackers can easily hack the system and get hold of crucial bank details, passwords and such intimate details about a person, the leakage of which can be detrimental(Eastwood, 2017). Further to this the main aim of an IoT is to ensure that the lives of people is easy at work and in personal sphere as well. Although the huge array of information collected will enable the individual or the company to take better decisions and calls, yet since various devices are connected it questions the privacy of the same. For example when it comes towards the security of the critical national infrastructure (CNI), with the various devices connected with the help of IoT, the distinction between the CNI and consumer world is eradicated. Thus this would lead to exploitation of CNI by the hackers (Govic, 2017). Another very prominent risk discovered by Symantec in the year 2013 was that a new virus was developed by the name of Linux Darlloz which not only would compromise the information stored in a computer system but also in some specific IoT appliances such as the smart tvs and home routers (Samani, 2014). The said virus mainly intends to get entry into those kind of Ids and Passwords which a4e formed via various well known combinations. It sends HTTP POST requests which takes advantage of the weakness of the system. Here if the target device is not running PHP, then it will download the virus from a malafide system and install it (Samani, 2014). Protection Mechanism The first protection mechanism that should be installed for protecting against various threats posed by IoT to the security is updating the devices and equipments on a continuous basis so that the same is not vulnerable to any attack. The risk increases if the patches are not updated frequently (Tanaka et.al. 2016). The best part is that the security of IoT which was earlier not paid heed to by people has now become a matter of concern for the federal government. Similarly various security firms and manufacturers are coming together to work together to secure the IoT world before it becomes out of control. For example the digital secure company Gemalto has plans to utilise its understanding in making online payments which would help to safeguard the IoT equipments. The company is offering the SE technology to the automotive and the utility corporations. It is a corrupt defiant constituent that gets rooted into equipments to help enhancement of digital safety and life cycle management with the help of encryption of and access-control restriction to susceptible information (Dickson, 2015). Conclusion and Future Trends Therefore on a concluding note, IoT is a reliable technology although has various hitches due to the security lapses it has to offer. However steps are being taken to secure the said vulnerabilities. It has given birth to various collaborations. One such is that done by Vodafone who founded the Internet of Things Security foundation which is liable for checking the devices which are connected to the internet for any kind of deficiencies and weaknesses it has to offer and will further extend a hand towards security of technology givers, those who adapt to systems and the final consumers. Lastly there are various researches also being conducted which would help to increase the level of security of using IoT once the internet and the device is connected to each other. It is very much visible that IoT has and will continue to be an integral part of the life of many and the security related problem should be addressed immediately by joining hands with corporations across the globe. References: Dickson,B. (2015). Why IoT Security Is SO Critical. Retrieved from https://techcrunch.com/2015/10/24/why-iot-security-is-so-critical/ Eastwood,G. (2017). 4 Critical security challenges facing IoT. Retrieved from https://www.cio.com/article/3166106/internet-of-things/4-critical-security-challenges-facing-iot.html Govic,N.H. (2017). Are We Creating An Insecure Internet of Things (IoT) ? Security Challenges and Concerns. Retrieved from https://www.toptal.com/it/are-we-creating-an-insecure-internet-of-things Meola,A. (2016). How the Internet of Things will affect security and privacy. Retrieved from https://www.businessinsider.com/internet-of-things-security-privacy-2016-8?IR=T Samani,R. (2014). 3 Key security challenges for the Internet of Things. Retrieved from https://securingtomorrow.mcafee.com/business/3-key-security-challenges-internet-things/ Tanaka,S., Fujishima,K. Mimura,N. Ohashi,T. Tanaka,M. (2016). IoT System Security Issues and Solution Approaches. Hitachi Review. 65(8). 69-73 Valeiras,C. (2016). Security Challenges Posed By Internet of Things. Retrieved from https://www.inhand.com/security-challenges-posed-by-internet-of-things/

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.