A Health System's leap to IOT
Industrial Scientific Blazes a Trail in IoT
IoT Platforms: What are They and Do You Need One?
IoT Facilitates Enhancements to Water Management Systems
Transforming the Future City
Brenna Berman, CIO, City of Chicago
How Internet of Things (IoT) will Rewire Supply Chains
Chad Lindbloom, CIO, C.H. Robinson
Embracing the Internet of Things
John Sprague, Deputy Associate CIO for Technology and Innovation, NASA
Managing the security risks of IoT devices
Steve Hanna, Distinguished Engineer, Infineon Technologies
Thank you for Subscribing to CIO Applications Weekly Brief

The Importance of IoT Security in Today's Digital Era

Wi-Fi and Bluetooth configurations in IoT devices pose a significant risk of data leakage. Weak encryption methods can allow attackers to steal credentials while data is being transmitted across the network
Fremont, CA: Digitally connected devices and applications are infiltrating all aspects of people's lives, including homes, offices, automobiles, and even their bodies. To reap the benefits of being connected to the internet, all objects are becoming smart. The Internet of Things (IoT) era is exploding at an alarming rate.
Most common threat vectors for IoT
Physical Possession of the Device
This is possibly the most dangerous of all threat vectors in which attackers gain physical access to devices and workloads. With this level of access, attackers can easily gain access to the internals of devices and their content, but they can also read all network communication using tools such as Shikra, Bus Pirate, or Logic Analyzers. An attacker with physical access to an IoT device can extract cryptographic secrets, modify its programming, or replace it with another device under their control.
Lack of Physical Boundaries
IoT devices exist outside of the traditional network perimeter and in the open. Traditional security approaches for restricting device access are no longer applicable. These devices can be moved to any new location as needed and configured to connect to the network.
Weakly Configured Wi-Fi and Bluetooth
Wi-Fi and Bluetooth configurations in IoT devices pose a significant risk of data leakage. Weak encryption methods can allow attackers to steal credentials while data is being transmitted across the network. Furthermore, most passwords are not uniquely set for each device, leaving the door open for unauthorized access to the entire network if just one device is compromised.
I agree We use cookies on this website to enhance your user experience. By clicking any link on this page you are giving your consent for us to set cookies. More info
Featured Vendors
-
Jason Vogel, Senior Director of Product Strategy & Development, Silver Wealth Technologies
James Brown, CEO, Smart Communications
Deepak Dube, Founder and CEO, Datanomers
Tory Hazard, CEO, Institutional Cash Distributors
Jean Jacques Borno, CFP®, Founder & CEO, 1787fp
-
Andrew Rudd, CEO, Advisor Software
Douglas Jones, Vice President Operations, NETSOL Technologies
Matt McCormick, CEO, AddOn Networks
Jeff Peters, President, and Co-Founder, Focalized Networks
Tom Jordan, VP, Financial Software Solutions, Digital Check Corp
Tracey Dunlap, Chief Experience Officer, Zenmonics