Internet of Things
What is the IoT?
The Internet of Things (IoT) is the internetworking of physical devices, vehicles ("connected devices" and "smart devices"), buildings, and other items - "things" embedded with electronics, software, and network connectivity that enable these objects to collect and exchange data.
- IoT developers don't spend lots of time thinking about how to secure all these devices.
- The consequences of a security breach are much higher in systems that affect public safety and human life.
- A hacker can breach your network not just to grab data, but to unlock your doors, manipulate traffic signals, or change the settings on your medical devices.
- Anything connected to the Internet is hackable.
Small, low-cost devices with limited processors are difficult to encrypt and secure. If someone finds a vulnerability on that type of device, it may be difficult to update the software, apply a patch, or even get news of a fix to consumers.
Take advantage of what experts have learned.
Incorporate the IoT into your security pratices, and work with vendors to evaluate their security features. Use encryption techniques to safeguard vital data.
Authentication is key in the IoT.
Design your system with authentication in mind. Authentication has always been important online. It's even more important in the IoT! Always remember to change default passwords!
A breach by an unauthorized user can expose sensitive data not only on the device, but also on the networks to which it’s connected. Consider that a substantial risk may require two-factor authentication.
Consider how to limit permissions.
Experts call this the "principle of least privilege." You should craft user roles and permissions to limit access to the level that will allow for normal functioning.