{"id":662,"date":"2024-10-02T02:05:23","date_gmt":"2024-10-02T08:05:23","guid":{"rendered":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/?p=662"},"modified":"2024-10-02T22:49:39","modified_gmt":"2024-10-03T04:49:39","slug":"iot-and-security","status":"publish","type":"post","link":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/2024\/10\/02\/iot-and-security\/","title":{"rendered":"IoT and Security"},"content":{"rendered":"\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"1000\" height=\"561\" data-src=\"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2024\/10\/AdobeStock_979601934_Preview.jpeg\" alt=\"IoT Security Image from Stock.Adobe.com\" class=\"wp-image-670 lazyload\" data-srcset=\"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2024\/10\/AdobeStock_979601934_Preview.jpeg 1000w, https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2024\/10\/AdobeStock_979601934_Preview-300x168.jpeg 300w, https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2024\/10\/AdobeStock_979601934_Preview-768x431.jpeg 768w\" data-sizes=\"(max-width: 1000px) 100vw, 1000px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 1000px; --smush-placeholder-aspect-ratio: 1000\/561;\" \/><figcaption class=\"wp-element-caption\">IoT Security Image from Stock.Adobe.com<\/figcaption><\/figure>\n\n\n\n<p>The days of smart living is now! Its not in the past nor in the future, we are living smart! I can conveniently connect with devices with a sound of my voice, a tap of my finger or phone, a wave of my hand and so many interesting and easy ways! Isn\u2019t that smooth?!&#8230; sure, it is!<\/p>\n\n\n\n<p>IoT or Internet of things as defined by <a href=\"https:\/\/aws.amazon.com\/what-is\/iot\/#:~:text=The%20term%20IoT%2C%20or%20Internet,as%20between%20the%20devices%20themselves.\">AWS<\/a>, refers to the collective network of connected devices and the technology that facilitates communication between devices and the cloud, as well as between the devices themselves. &nbsp;<\/p>\n\n\n\n<p>These IoT devices ranges from household items, tools to items found in offices and everywhere. Organizations make use of these IoT devices to efficiently and effectively carry out their day-to-day operations, deliver excellent service and improve the overall business. IoT devices has lots of benefits and has significantly improved lives and businesses.<\/p>\n\n\n\n<p>The big question is, has IoT improved security in our day to day living and businesses or has it increased the attack surface?? Well, I think we all know the answer.<\/p>\n\n\n\n<p>According to IoT Analytics, there were 16.6 billion connected IoT devices by the end of 2023 (a growth of 15% over 2022) and IoT is expected to grow 13% to 18.8 billion by the end of 2024. With these figures in mind and knowing that most IoT devices were built without security in mind but for convenience and efficiency, I think its time for a change.<\/p>\n\n\n\n<p>There is a growing threat of cyber attacks against the rising number of IoT devices, standards need to be put in place to at least some extent mitigate these threats and help protect business and individuals from cyber attacks. Som examples of these IoT attacks include:<\/p>\n\n\n\n<p><strong>Cold in Finland:<\/strong><\/p>\n\n\n\n<p>In November 2016, cybercriminals turned off the heating in two buildings in the Finnish city of Lappeenranta. After that, another DDoS assault was launched, forcing the heating controllers to reboot the system repeatedly, preventing the heating from ever turning on. This was a severe attack since Finland experiences severely low temperatures at that time of year.<\/p>\n\n\n\n<p><strong>The Jeep Hack:<\/strong><\/p>\n\n\n\n<p>In July 2015, a group of researchers tested the security of the Jeep SUV. They managed to take control of the vehicle via the Sprint cellular network by taking advantage of a firmware update vulnerability. They could then control the vehicle\u2019s speed and even steer it off the road.<\/p>\n\n\n\n<p>IoT not only faces cyber attacks but also privacy issues from vendors. How is the data collected from billions of IoT devices stored and used? All these and more need to be addressed in setting a standard for IoT development and use.<\/p>\n\n\n\n<p>According to Fortinet,<\/p>\n\n\n\n<p>IoT and security requirements can only be accomplished with an integrated solution that delivers visibility, segmentation, and protection throughout the entire network infrastructure, such as a holistic&nbsp;<a href=\"https:\/\/www.fortinet.com\/solutions\/enterprise-midsize-business\/security-fabric\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>security fabric<\/strong><\/a>&nbsp;approach.<\/p>\n\n\n\n<p>Your IoT security must contain the following key abilities:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Learn:<\/strong>&nbsp;With complete network visibility, security solutions can authenticate and classify IoT devices to build a risk profile and assign them to IoT device groups.<\/li>\n\n\n\n<li><strong>Segment:&nbsp;<\/strong>Once the enterprise understands its IoT&nbsp;<a href=\"https:\/\/www.fortinet.com\/resources\/cyberglossary\/attack-surface\"><strong>attack surface<\/strong><\/a>, IoT devices can be segmented into policy-driven groups based on their risk profiles.<\/li>\n\n\n\n<li><strong>Protect:&nbsp;<\/strong>The policy-driven IoT groups and internal&nbsp;<a href=\"https:\/\/www.fortinet.com\/resources\/cyberglossary\/network-segmentation\"><strong>network segmentation<\/strong><\/a>&nbsp;enable monitoring, inspection, and policy enforcement based on the activity at various points within the infrastructure.<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"988\" height=\"600\" data-src=\"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2024\/10\/iot-security-requirements.jpg\" alt=\"\" class=\"wp-image-663 lazyload\" data-srcset=\"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2024\/10\/iot-security-requirements.jpg 988w, https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2024\/10\/iot-security-requirements-300x182.jpg 300w, https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2024\/10\/iot-security-requirements-768x466.jpg 768w\" data-sizes=\"(max-width: 988px) 100vw, 988px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 988px; --smush-placeholder-aspect-ratio: 988\/600;\" \/><\/figure>\n\n\n\n<p><a href=\"https:\/\/www.fortinet.com\/content\/dam\/fortinet\/images\/cyberglossary\/iot-security-requirements.png\"><strong><\/strong><\/a><\/p>\n\n\n\n<p><strong><a href=\"https:\/\/www.fortinet.com\/content\/dam\/fortinet\/images\/cyberglossary\/iot-security-requirements.png\">Click to See Larger Image<\/a><\/strong><\/p>\n\n\n\n<p>To get more information on securing IoT you can read this article here by <a href=\"https:\/\/www.fortinet.com\/resources\/cyberglossary\/iot-security\">Fortinet.<\/a><\/p>\n\n\n\n<p>References:<\/p>\n\n\n\n<p><a href=\"https:\/\/www.techtarget.com\/iotagenda\/definition\/Internet-of-Things-IoT\">https:\/\/www.techtarget.com\/iotagenda\/definition\/Internet-of-Things-IoT<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/aws.amazon.com\/what-is\/iot\">https:\/\/aws.amazon.com\/what-is\/iot<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/iot-analytics.com\/number-connected-iot-devices\/#:~:text=Number%20of%20connected%20IoT%20devices%20to%20grow%2013%25%20by%20end,by%20the%20end%20of%202024.\">iot-analytics<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.cm-alliance.com\/cybersecurity-blog\/iot-security-5-cyber-attacks-caused-by-iot-security-vulnerabilities\">Cyber Management Alliance<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The days of smart living is now! Its not in the past nor in the future, we are living smart! I can conveniently connect with devices with a sound of my voice, a tap of my finger or phone, a wave of my hand and so many interesting and easy ways! Isn\u2019t that smooth?!&#8230; sure, &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/2024\/10\/02\/iot-and-security\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;IoT and Security&#8221;<\/span><\/a><\/p>\n","protected":false},"author":668,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"ngg_post_thumbnail":0,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-662","post","type-post","status-publish","format-standard","hentry","category-uncategorized","entry"],"featured_image_src":null,"featured_image_src_square":null,"author_info":{"display_name":"Ukamaka Udeaja","author_link":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/author\/ukamaka-udeaja\/"},"_links":{"self":[{"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/posts\/662","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/users\/668"}],"replies":[{"embeddable":true,"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/comments?post=662"}],"version-history":[{"count":2,"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/posts\/662\/revisions"}],"predecessor-version":[{"id":671,"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/posts\/662\/revisions\/671"}],"wp:attachment":[{"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/media?parent=662"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/categories?post=662"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/tags?post=662"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}