Technology: Rethinking Safety in the IoT World
When everything is online, security is everyone's job.
What is in this article?:
- Technology: Rethinking Safety in the IoT World
- Changing the Security Game
"For organizations to thrive in this connected market, they need to be connected... That transcends even the security concerns. You need to be connected to do the job you need to do."
At this point, car hacking is practically a sport.
A quick YouTube search pulls an endless stream of videos depicting grinning researchers and pranksters hacking into their cars' steering and operation systems with old school Nintendo controllers or custom iPhone apps. There are even some virus-encrypted audio CDs floating about that can hijack a car's total software system to gain remote access and control of everything from dashboard readings to anti-lock brakes.
And these are just a few of the techniques being explored on some already outdated car models. As the industry moves more toward the next generation of self-driving cars and vehicle-to-vehicle communication, carmakers are starting to worry about the risks that are accompanying all of the perks of the technologies driving it: the Internet of Things (IoT).
And they're not the only ones.
Securing IoT
"By 2020, we expect to see 20 billion smart objects connected to the Internet," says Rob Soderbery, senior vice president and general manager, Enterprise Networking Group, atCisco (IW 500/30).
Of those billions, he says, the connections with the most to gain are in manufacturing and industrial automation. And that puts the whole industry at risk.
Just as hackers are drawn to the unprotected architectures of automobile software, other nefarious agents are attracted to unprotected connected control systems, smart tools and online architectures of massive online manufacturing enterprise systems. But security breaches in the manufacturing space can have much greater consequences.
On the financial side, studies indicate that even mild attacks cost the industry $40 to $80 billion each year, escalating as the threats target operations.
And beyond that, "there are lives at stake," Soderbery says. "There are societal issues; there are compliance and regulatory issues. The threat diversity is fundamentally different in this field."
No comments:
Post a Comment