The Evolution of Manufacturing Processes
Industrial Scientific Blazes a Trail in IoT
IoT Platforms: What are they and do you need one?
Some Simple Steps You can Take to Keep Devices Secure
Business Success Requires Artificial Intelligence
Greg Smiley, CIO, Florida Department of Transportation
Preparing IT for the Internet of Things
Scott Fenton, VP and CIO, Wind River
IoT Facilitates Enhancements to Water Management Systems
Patrick Stephens, CIO, Rain for Rent
Transforming the Future City
Brenna Berman, CIO, City of Chicago
IoT- Need for Privacy and Encryption
Susan Landau, in a recent event titled Listening In: Cybersecurity in an Insecure Age at New America, called attention to the need for discussion on “Security vs. Security” instead of “Security vs. Privacy”, as has been the norm while talking about the Internet of Things (IoT). In her book with the same title, she uses her legislative knowledge and historical perception together with her descriptions of cyber attack to emphasize the need to protect data.
Landau stresses the need to understand the detailed working of contemporary communications technologies to match up against the techniques nation-state attackers, organized criminals and other bad actors use to defeat security. She insists that encryption is the preferred method, instead of building front/back doors into security that others will eventually gain access to. Advocating the widespread use of the 2-factor authentication, she considers it, along with automatic security updates and ephemeral communication, as essential steps to safeguard data.
The author suggests limiting the shelf-life if the device is not updated regularly. Landau, who doubts the efficiency of blockchain technology with 2-factor authentication in alleviating security challenges, explains that despite the advantages of anonymous devices, they might not be particularly useful with security devices, making the trend unlikely to become popular among IoT devices. Laws regarding safety need to be framed generally, she reiterates, for if a system cannot be updated for security protection, it has a limited shelf-life. Landau ends her talk by reiterating the need for privacy and encryption.