A Health System's leap to IOT
Industrial Scientific Blazes a Trail in IoT
IoT Platforms: What are They and Do You Need One?
IoT Facilitates Enhancements to Water Management Systems
Transforming the Future City
Brenna Berman, CIO, City of Chicago
How Internet of Things (IoT) will Rewire Supply Chains
Chad Lindbloom, CIO, C.H. Robinson
Embracing the Internet of Things
John Sprague, Deputy Associate CIO for Technology and Innovation, NASA
Managing the security risks of IoT devices
Steve Hanna, Distinguished Engineer, Infineon Technologies
Thank you for Subscribing to CIO Applications Weekly Brief
IoT devices differ in terms of their complexities, capabilities, and vendors. There's a good chance that the release dates, bitrates, technical interfaces, and functionalities of IoT devices will differ.
Fremont, CA: The Internet of Things (IoT) solves pressing business problems while also posing significant challenges.
IoT technology has provided numerous benefits to various businesses (healthcare, transportation, etc.), but it has also raised security concerns due to its increasing interconnectedness.
Entities in IoT are not always the same as devices, objects, or services. Every entity serves a distinct purpose, has a distinct interface, a distinct operating mechanism, and employs a distinct technology. Given the diversity, applying security constructs that are the same as the constructs of other assets will not produce the desired results while ensuring cybersecurity.
Common IoT security issues:
Policies
IoT requires policies and standards to ensure that data is securely stored, transmitted, and processed. As you deal with multiple entities in the Internet of Things and their dynamic environment, imposing such policies and standards across all devices becomes difficult.
To achieve predefined service level agreements, you must have clear standards that are enforced by your security mechanism across all IoT devices (SLAs).
Authentication
IoT devices or objects should be able to recognize and authenticate one another. However, when there are so many entities (devices, services, people, processing units, and so on) involved, authentication becomes difficult.
Furthermore, when IoT objects interact with each other for the first time, authentication becomes difficult. To address this IoT security challenge, you will need a proper mechanism that authenticates entities in every interaction.
Heterogeneity
IoT devices differ in terms of their complexities, capabilities, and vendors. There's a good chance that the release dates, bitrates, technical interfaces, and functionalities of IoT devices will differ.
Organizations face a challenge in designing and implementing security protocols that cover such a wide range of IoT stages. Furthermore, IoT operates in a dynamic environment where device connectivity can change. To ensure IoT security, you must consider these parameters when designing protective measures.
See Also : Endpoint Security Solution Companies
I agree We use cookies on this website to enhance your user experience. By clicking any link on this page you are giving your consent for us to set cookies. More info
Featured Vendors
-
Jason Vogel, Senior Director of Product Strategy & Development, Silver Wealth Technologies
James Brown, CEO, Smart Communications
Deepak Dube, Founder and CEO, Datanomers
Tory Hazard, CEO, Institutional Cash Distributors
Jean Jacques Borno, CFP®, Founder & CEO, 1787fp
-
Andrew Rudd, CEO, Advisor Software
Douglas Jones, Vice President Operations, NETSOL Technologies
Matt McCormick, CEO, AddOn Networks
Jeff Peters, President, and Co-Founder, Focalized Networks
Tom Jordan, VP, Financial Software Solutions, Digital Check Corp
Tracey Dunlap, Chief Experience Officer, Zenmonics