Posts Tagged 'Internet of Things'

Oct 262016
 
IoT-based DDOS Attacks

Last week’s DDoS attack against Dyn Inc. had an impact on many organizations beyond the reported hits to PayPal, Twitter, Amazon, Spotify, and others. Even Cutter’s website search function was out of commission for a short while! Experts have warned that at some point, smart versions of devices such as refrigerators, televisions and thermostats could be manipulated to alter their basic functions, but did anyone foresee that these devices would be used to launch a third-party attack? This isn’t the first time it’s happened, and it’s not likely to be the last. In the July 2016 Cutter article Securing the IoT: It Takes the Global Village, author David Tayouri discusses the threats Internet of Things Read more

Apr 222016
 
Call for Papers: Cyber Threats in the Era of the Internet of Everything

This upcoming issue of Cutter IT Journal seeks articles on new approaches, strategies, and solutions to help IT professionals address and prevent the possibility of cyber attacks stemming from IoT related devices. Cyber threats have been on the rise, and more so with the advent of the Internet of Everything (IoE). Common appliances are now featuring intelligent processing and real-time connections to the Internet. Health measurements are now collected in real-time by smart wearables, including general purpose smart watches. The latest models from automobile manufacturers feature cloud connectivity for enabling remote software updates, tracking fuel consumption, and streaming dashcam activity. On a larger scale, the smart grid ensures seamless and dynamic allocation of energy where Read more

Feb 092016
 
Call for Papers: IoT Data Management and Analytics

The Internet of Things (IoT) is rapidly emerging as a transformational paradigm with a multitude of products and services now available and being adopted by corporations as well as individuals seeking to harness the vast opportunities it offers. But we do face a major obstacle in realizing the full potential of the IoT. The sheer variety, volume and velocity of data generated by the IoT presents unprecedented challenges in deriving meaningful and actionable insights and calls for a strategic approach to data management and usage. These approaches also need to address business strategies, business processes, enterprise architecture, systems and applications, and security and privacy considerations. It is also important to examine and decide what data Read more

Dec 202014
 
IoT, the Reckless Adolescent

The Internet of Things was much in the news in 2014, and will continue to develop. In the last months of 2014, the emphasis seems to have shifted toward wearable devices for health and fitness improvement. These devices are particularly intrusive into our personal lives, yet the sensing and communication capabilities, as well as the analytics provided in the cloud for the data being gathered, are not being matched by an equal emphasis on information security and privacy. Will we see leaks and a backlash? Will the security part of the IoT architecture catch up, or will it just muddle along? Makers of devices and apps: take care of this before it hurts you. Buyers: Read more

Dec 172014
 
It’s 2015 – Do You Know Where Your Data Is?

The “Internet of Things” will take further hold and become more fully embedded as a reality in our society. However, a tipping point is likely to be reached in 2015 as public awareness of the potential for these technologies to violate personal privacy increases. This will lead to an associated public outcry for stricter controls and government legislation regarding how people, organizations and government collect and use this information. The public will no longer be satisfied to leave technology companies and users to self-police their uses of their personal data. Surveillance and other technologies that permit the collection of data about people will continue to proliferate. Analytical tools are emerging to interpret this information, and Read more

Major IoT Hack to Come

 Posted by on Dec 8, 2014  No Responses »
Dec 082014
 
Major IoT Hack to Come

I predict there will be a major hack to a connected devices, causing havoc and putting a temporary damper on the stampede towards the Internet of Things. It will be widespread, as the hackers will want to show just how vulnerable we are. This will be a temporary setback, and the precise impact will depend on the severity of the damage done — but the Internet of Things development will continue. In a related note, it will be revealed that the government has experimenting with novel ways to conduct surveillance using these connected devices. My biggest bet is that LEDs used to light public areas will be the first discovered, but there may be even Read more

Dec 042014
 
Role of IT to be Turned Inside Out by the Internet of Things

Historically, IT’s role has been to ensure that hardware systems and software applications properly support the day-to-day needs of an organization’s executives, end-users and business processes. More recently, IT has been asked to help business users more effectively gather and interpret an escalating volume of data from internal and external sources. The end result was adopting better analytics systems for internal purposes. The Internet of Things (IoT) will push IT to become a part of the company’s product development and support processes as hardware and software become embedded into the products and services companies manufacturer and deliver. In many ways, this new role will really be a fulfillment of the past promises that IT become Read more

Aug 282014
 
Call for Papers: The IoT -- Technologies, Opportunities and Solutions

The Internet of Things in its basic form is the interconnected network of uniquely identifiable sensors, devices, and computers. The ability to connect all these “things” together creates the opportunity to develop a limitless set of solutions applicable to every domain. Manufacturing plants can track the status of products being created as they cross the manufacturing floor. Building management companies can track the health of lighting or heating/cooling systems remotely. Governments can track water flow through water systems, crossers of their borders, traffic in their cities, and medicines to address pandemics. Consumers can manage their homes or vehicles from a distance. All these possible solutions are not technologically alike. Some require real-time capabilities, others require Read more

Apr 082014
 

I’m excited about the Internet of Things (IoT), and I expect it to create incredible opportunities for companies in almost every industry. But I’m also concerned that the issues of security, data privacy, and our expectations of a right to privacy, in general — unless suitably addressed — could hinder the adoption of the IoT by consumers and businesses and possibly slow innovation. So, with all the hype of the IoT, I’m going to play devil’s advocate, because these issues tend to receive limited coverage when considering the impact of new technology developments on society. First of all, I am amazed at all the connected products and services that are starting to appear. These include, Read more

Dec 172013
 
IoT, Big Data, Mobile Apps, Drones to Impact Privacy & Security

Here are my predictions for 2014: 2014 will bring exponential expansion and evolution of the Internet of Things (IoT). This will also bring new opportunities for information security trailblazers unlike any we’ve seen before. The potential benefits of the IoT will be huge, but just as large will be the new and constantly evolving information security and privacy risks. We will see some significant privacy breaches resulting from the use of IoT devices as a result. New IoT risks, and resulting security incidents and privacy breaches, will bring a significant need for technology information security pros to also understand privacy concepts so they can implement privacy protections within all these new devices, and into the Read more