The Internet of things: what and what are the risks

12:31 PM
The Internet of things: what and what are the risks -

Imagine living in a house where all objects and devices in your home are online, talk? the other, and to meet your needs. You wake up and the coffee is prepared and ready to be served. You get home from work and your favorite TV channel is automatically activated. These really clever inventions us where the Internet of Things is the head, but at what price show?

Tech Expert Kevin Ashton coined the term "Internet of Things" way back in 1999. The concept was in its infancy then, but it is to describe the connection of objects of every day, or things , the Internet. These objects, including conventional connected devices and smart devices to work together on a system to meet the needs of consumers.

Familiar Internet of things devices include television and a smart refrigerator, but eventually these devices will be considered as a basic use of technology. Companies such as ThingWorx3 Sen.se and develop devices that recover seamlessly knowledge without people looking for her.

Smart Appliances can be hacked

We are all told to install antivirus software and spyware detectors on our PCs and laptops to keep our data safe, but we not such strategies to protect our smart devices. Experts suggest these innovative gadgets are just as vulnerable, so it is little wonder that nine out of ten Americans fear their information will be stolen from a smart device.

The threat became real when the pirates entered routers, multimedia home networking centers, smart TVs, and at least one Smart TV to create a botnet at the end of 2013. The attackers used this platform to provide more than 750,000 malicious emails to targeted recipients between 26 December 2013 and January 6, 2014.

over a quarter of the messages were sent from other devices laptops, mobile devices and desktop computers. With so many different Internet devices ready at their disposal, hackers have sent more than 10 emails from a single source. This made the attack very difficult to block. California security firm Proofpoint said the case was "important safety implications" for owners of these devices.

"The findings of Proofpoint reveal that cybercriminals began to requisition home routers, smart appliances and other components of the Internet of things and turn them into" thingbots " to carry out the same types of attacks usually associated with personal computers, "said a company statement.

Cosoi, chief security strategist at Bitdefender does not believe" the bad guys have understood the benefits for them to make use of such things, "but she is sure that time will come.

If hackers broke into the security cameras of a company, they could see exactly how the company worked, and use information for industrial espionage. If the pirates attacked the door locks compatible with Internet presented at the Consumer Electronics Show, the safety of homeowners and their property could be compromised. Obviously, spam emails are just the tip of the iceberg.

Smart Appliances often are not protected

Proofpoint believes hackers can find attractive smart devices because they often have less security than computers and tablets. "Many of these devices are poorly protected at best and consumers have virtually no way to detect or fix infections when they occur," said said David Knight, general manager of information security Proofpoint Products Group . "Companies may find distributed attacks increasing as more and more of these devices come on-line and attackers find additional ways to exploit them."

The situation does not look like it changes, the research director David Orain Cisco stating that "it is impossible to put security software on each object."

The Internet of Triggers objects regarding confidentiality

When you sign up for the mailing list of a website or purchasing a product from your smartphone, you know who you share your information with and make a educated judgment as to whether the company will use your data responsibly. However, do you know who can access the information you share on a loan Internet device, or how they will use it?

40% information technology experts say that this knowledge should be chief concern among consumers about the Internet of Things. They also believe that the way this information is used will be a real concern that Internet of things is growing.

You might not think that someone discovers your love action movies through your smart TV, but you'd be more protection of your privacy if they have learned when you were in the home by monitoring the use of electricity on your smart meter. As elements in the Internet of Things work together and compile a more complete picture of you, the risk to privacy will become a greater concern.

Your sensitive data often are not stored safely

Have you ever thought about what happens to your data when you submit? You assume it will probably entitled to an Internet gateway, but this is often the case. Many smart meters in the beginning, for example, send it to a local data collection center where it is ready for collection in bulk later. This process sees them sitting vulnerably sensitive data in unsecured locations indefinitely. These electricity meters are one of the many Internet-ready devices that operate in this way, leaving our data exposed without our knowledge.

The Internet of Things raises access issues

When we use traditional Internet devices, we rely on user names and passwords to establish our connection and access to sensitive information. However, in the Internet of Things, we are usually connected without login information.

This is problematic because there is no control mechanism to ensure that we are what we say we are. There is also no easy way to edit information for an intelligent device collected if circumstances change.

With the Internet of Things, it is not just people who need identification, but the objects involved. For example, consider a system that monitors the cattle to determine if the cows show symptoms of disease. A farmer must know that cows, it is followed are those in the paddock, especially if it buys and sells part of his flock. It must also ensure that his trusted employees can access the system.

The Internet of Things has the potential to improve our lives, but before we dive right in it is important that you consider the risks and implement the necessary security measures to protect our privacy and data.

Previous
Next Post »
0 Komentar