Internet of Thingbots: The New Security Worry - InformationWeek
Data Management // Big Data Analytics
01:25 PM
Connect Directly
Faster, More Effective Response With Threat Intelligence & Orchestration Playboo
Aug 31, 2017
Finding ways to increase speed, accuracy, and efficiency when responding to threats should be the ...Read More>>

Internet of Thingbots: The New Security Worry

Phishing and spam attacks involving Internet of Things devices are coming -- and app developers and device makers must be ready, says a CA Technologies exec.

Comment  | 
Print  | 
Newest First  |  Oldest First  |  Threaded View
User Rank: Apprentice
5/1/2014 | 1:08:14 PM
Scale and cost will be key
Very interesting article. I think the nature and scale of M2M and IoT brings unique cyber security challenges including trust (untrusted devices, networks), cost (cannot be expensive considering the large number of devices), privacy (who owns data and how to securely share it), access (static access controls cannot adjust to dynamic nature of IoT), performance (low power devices can't spare many cycles for security), interoperability, integration into existing security paradigms etc. Not to mention cryptography - how do we seed with good randum numbers in order to get good crypto?

Interesting times indeed!
Shane M. O'Neill
Shane M. O'Neill,
User Rank: Author
4/30/2014 | 5:16:22 PM
Re: Avoiding pitfalls of Internet of People
Hey, I do floss every night.

My high-level observation here is that after witnessing the Target breach and Heartbleed, we're not ready yet for the Internet of things. Security isn't resilient enough and people aren't prudent enough. But here come the vendors pushing out products as fast as they can. I like the idea of connected home appliances that I can control from a smartphone -- it's innovative and useful and there's definitely a cool factor. But I'm going to wait out the hacks and growing pains. See you in 2016.
Lorna Garey
Lorna Garey,
User Rank: Author
4/30/2014 | 3:30:43 PM
Re: Avoiding pitfalls of Internet of People
Sure, and we should all floss every night too. Let's face it, hardly anyone really understands IPv6, developers whip out APIs with little regard for security, and a fair number of consumers are going to enable their fridges to communicate for no other reason than because it's whiz-bang and cool. We're doomed.
User Rank: Apprentice
4/30/2014 | 3:04:00 PM
Avoiding pitfalls of Internet of People
Is there any reason for refrigirator or TV set to send emails?? Just because it can be done does not mean it should be done. I have been appaled for many years at the level of "amateurism", for the lack of better word, that current Internet of people operates. It feels like one temporary solution slapped on the other, without ever taking a pause and redisigning it with security in mind. Domains are not "entrusted", emails can be send in a deceiving way, pretending to be from somewhere or someone else, etc. We should really make sure that Internet of things does not go the same way. Each IP address should be registered and entrusted, "things" should have limited, but strictly defined functionality and strong encription protocols should be used in communicating with them.
User Rank: Author
4/30/2014 | 2:21:22 PM
Re: Compromised IoT, a cheaper way to SPAM?
I agree, we should not be surprised to see new types of device hacks. Take this week's news around a baby monitor being hacked. Anything with a camera deserves special scrutiny.
User Rank: Apprentice
4/30/2014 | 2:11:24 PM
Security and the Internet of Things
Security will be the number one concern when the Internet of things is being introduced into the general public. No one would be willing to trade security for convenience on this level.  That means that the companies that stand to make billions off the industry need to have universal security protocols.  This protects the industry and the consumer.  Everybody wins
User Rank: Ninja
4/30/2014 | 2:07:31 PM
Compromised IoT, a cheaper way to SPAM?
It makes perfect sense that malicious traffic is going to look for a new way to be transmitted, and with the increased awareness of users when it comes to computers, laptops, tablets and smartphones, it isn't a surprise that the path of least resistance when it comes to infecting data-creating devices will be to leverage these smart or connected endpoints to be the new sources to push out the traffic.  Until proper security can be built into the devices themselves, we can expect to see a steady increase in malicious traffic as the adoption rate of IoT increases as well.
How Enterprises Are Attacking the IT Security Enterprise
How Enterprises Are Attacking the IT Security Enterprise
To learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Register for InformationWeek Newsletters
White Papers
Current Issue
IT Strategies to Conquer the Cloud
Chances are your organization is adopting cloud computing in one way or another -- or in multiple ways. Understanding the skills you need and how cloud affects IT operations and networking will help you adapt.
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Flash Poll