https://www.engineeringnews.co.za

IoT – exposure everywhere

19th September 2016

  

Font size: - +

This article has been supplied as a media statement and is not written by Creamer Media. It may be available only for a limited time on this website.

Internet of Things  (0.03 MB)

The adoption of IoT technologies is set to broaden the risk exposure consumers and enterprises face, driving a need for new legislation, more layers of security and increased awareness, says Fortinet.

The arrival of Internet of Things technologies might not significantly change the mode of attack used by cybercriminals, but it does increase the risk exposure of both enterprises and individuals. With every object connected to the Internet, every IoT device becomes a potential gateway to the enterprise as well as a potential target for attack. In 2015, some large local enterprise came under a DDoS attack that targeted its internal systems, for example. For the best part of a day, the enterprise could not trade. Incidents such as these highlight what can go wrong when IoT-enabled enterprises come under attack in the future from cybercriminals, competitors, activists or disgruntled employees seeking revenge.

In the past, DDoS and other type of attacks might have shut down websites or trading systems to fairly devastating effect. In future, when all IP devices are connected, you could find attackers targeting everyday objects – point of sale systems; branch office alarms and CCTV cameras; building management systems; sports stadium access gates; healthcare equipment like pacemakers and heart monitors; logistics control systems and utilities to mention a few. In people’s homes, smart TVs might be accessed to steal the user’s identity and commit fraud, children’s monitors and wearable’s might be accessed in order to track their movements; in-car systems might become vulnerable to attack.

Because IoT is still in its early stages, the extent of the crimes that could be committed using IoT technologies is not yet known, but it is clear that hacking for profit or revenge will become a whole lot easier when everything is connected.

Preparing to benefit from the advantages of IoT while still ensuring that individuals and enterprises are kept safe from cyber attackers demands action at a number of levels: for one, a national regulator should be put in place to oversee internet security standards and governance of stakeholders such as broadcasters, telecommunications companies and ISPs.

Heightened awareness is needed on the part of enterprises implementing IoT solutions – multiple layers of security will be necessary across all smart devices, their associated networks and even their cloud-based management tools. Enterprises will have to step up their monitoring of both active traffic and historical traffic on Internet pipes and local area networks and look at sandboxing tools and real-time monitoring of security devices.  Companies currently using two-factor authentication might consider moving to three factor authentication that includes a biometric component, to improve user authentication.

To secure the data centre, automation and software defined networking, internal segmentation firewalls that control access by users, devices and network domains to ‘containerise’ the user, rather than attempting to lock down the enterprise within a perimeter, and full visibility and management of the distributed environment off a single pane of glass become increasingly important. Enterprises also need to revisit both skills development and staff training continuously. Security and data access policies and procedures need to be clearly spelt out to employees whenever new legislation comes into effect, and whenever new operating systems or applications are introduced or new cyber threats emerge.

To mitigate this plethora of new threats demands a range of high end niche security skills to implement and manage the multi-layered security environment, but many of these skills are difficult to source and keep in-house. For this reason, many local enterprises are now turning to specialised risk and security consulting firms to oversee critical security projects and risk management.

Edited by Creamer Media Reporter

Comments

Showroom

Schauenburg SmartMine IoT
Schauenburg SmartMine IoT

SmartMine IoT has been developed with the mining industry in mind, to provides our customers with powerful business intelligence and data modelling...

VISIT SHOWROOM 
SMS group
SMS group

At SMS group, we have made it our mission to create a carbon-neutral and sustainable metals industry.

VISIT SHOWROOM 

Latest Multimedia

sponsored by

Magazine round up | 19 April 2024
Magazine round up | 19 April 2024
19th April 2024

Option 1 (equivalent of R125 a month):

Receive a weekly copy of Creamer Media's Engineering News & Mining Weekly magazine
(print copy for those in South Africa and e-magazine for those outside of South Africa)
Receive daily email newsletters
Access to full search results
Access archive of magazine back copies
Access to Projects in Progress
Access to ONE Research Report of your choice in PDF format

Option 2 (equivalent of R375 a month):

All benefits from Option 1
PLUS
Access to Creamer Media's Research Channel Africa for ALL Research Reports, in PDF format, on various industrial and mining sectors including Electricity; Water; Energy Transition; Hydrogen; Roads, Rail and Ports; Coal; Gold; Platinum; Battery Metals; etc.

Already a subscriber?

Forgotten your password?

MAGAZINE & ONLINE

SUBSCRIBE

RESEARCH CHANNEL AFRICA

SUBSCRIBE

CORPORATE PACKAGES

CLICK FOR A QUOTATION







sq:0.106 0.162s - 158pq - 2rq
Subscribe Now