IoT is a vulnerable black-hole to attacks

Source: Internet
Author: User

IoT is hyping and could change our life more severly than ever before. But does we ready for its risk or disaster? It is a vulnerable black-hole to malicious attacks. Think about a vandal turns off your refrigerator, disable your security system or unlock your back door.

Some scenarios is more terrifying, such as a hacked pacemaker or a successful attack on a moving vehicle.

the Things (Devices) is exapanding rapidly with the arrival of the IoT, which enlarged network Capabi Lity to a broad spectrum of devices that never had this capability before, such as office appliances like thermostats and Refrigerators. As there devices become internet-enabled, experts fear an embedded systems security worst-case scenario for enterprises, M Any of which is unaware of this risk or unable to mitigate them.

the rapid Increse in nontranditional internet-enabled devices means more potential enterprise entry P Oints for attackers, because of the embedded system troubing security history. Embedded system usually used wireless communication and proprietary components which can is not a shared between each others . So if a bug is founded, it's less likely to being fixed due to cost and resource constraints. The embedded devices is often lack of computing resource, then it's difficult to implement complex schemes for security. Even if a software update is AVAILABLE,
enterprises often overlook these embedded devices because of low cost and low revenue.

The key to secure embedded devices are in securely designing them from the beginning. The hardware and Fireware should is designed from the ground up to prevent access from malware and physical tampering. Encryption and Fireware digital signature can be used. Using Endpoint protection would block everything except whitelisted products.

Deploying embedded devices behind a Gateway/hub or a virtual system is also a good choice. It's cost-efficient to update a new-rule to stop new threats-concentrated point.

besides The tech, we also should pay more attention to the IoT security with better understanding and Rules. According to a recently, more than two-thirds of Forbes Global companies in the UK remain vulnerable to Atta Cks that exploit incomplete remediation of the Heartbleed vulnerability in OpenSSL. Although the serious vulnerability is discovered and complete remediation also provided last year, still many enterprises Overlooked this risk.

Better Tech and Better pre-prepartion can make we life more convenient and more comfortable. Neither can ignored

IoT is a vulnerable black-hole to attacks

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.