16.07.2016 Views

Smart Industry 1/2016

Smart Industry 1/2016 - The IoT Business Magazine - powered by Avnet Silica

Smart Industry 1/2016 - The IoT Business Magazine - powered by Avnet Silica

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>Smart</strong> Business Making the world safe<br />

Internet of Threats<br />

Today more and more everyday devices<br />

are interconnected. While they are certainly<br />

making life easier, they have also<br />

created new attack vectors for hackers.<br />

As we begin to enter the world of IoT<br />

it is important to be aware of and<br />

understand the new and<br />

expanded security risks<br />

involved and how<br />

to combat them.<br />

■ by Gerhard Kafka*<br />

Now that we are going to<br />

connect everything to the<br />

Internet, new opportunities<br />

are arising for cybercrime.<br />

The IoT refers to any object or device<br />

which connects to the Internet to automatically<br />

send and/or receive data.<br />

These include automated devices<br />

which remotely or automatically adjust<br />

lighting or HVAC (heating-ventilationair-conditioning),<br />

security systems,<br />

such as security alarms or Wi-Fi cameras,<br />

including video monitors used in<br />

nursery and daycare settings, medical<br />

devices, such as wireless heart monitors<br />

or insulin dispensers, thermostats,<br />

wearables, such as fitness devices,<br />

modules which activate or deactivate<br />

lights, smart appliances, such as smart<br />

refrigerators and TVs, office equipment,<br />

such as printers, entertainment<br />

devices to control music or television<br />

Intelligence<br />

services<br />

will use the<br />

IoT to gain<br />

access to<br />

networks<br />

James R. Clapper<br />

Director of US National<br />

Intelligence<br />

from a mobile device, and fuel monitoring<br />

systems, just to name a few.<br />

As organizations and vendors rush<br />

to create a totally connected society,<br />

they are typically faced with two<br />

photo©: Wikipedia<br />

daunting question. The first: How to<br />

develop products quickly enough<br />

to gain a time-to-market advantage,<br />

with the markets and applicable<br />

regulators dictating requirements<br />

and thus the level of investment in<br />

product security by vendors. And<br />

the second: How to embed security<br />

throughout the lifecycle of IoT product<br />

development, as this will result in<br />

higher costs and slower time to market,<br />

albeit clearly adding value in the<br />

short, medium, and long term.<br />

Both are tough questions, but unless<br />

cyber-security is considered in<br />

every phase of IoT development,<br />

including requirement setting, product<br />

design and developmental, as<br />

well as deployment, the problems<br />

companies have encountered with<br />

embedded systems in the past will<br />

seem like child’s play.<br />

30<br />

*Gerhard Kafka is an experienced writer and author of numerous books in the fields of digitalization and IoT

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!