TECHNOLOGY

IoT: What Is Security For Smart Devices?

The Internet of Things (IoT) encompasses a wide range of interconnected and Internet-connected devices that can collect and transfer data across the network without human intervention. The increase in the use of intelligent technologies leads to greater convenience of the IoT, but it also opens the door to cybersecurity threats.

Reports of cyber breaches are on the rise as the security level of each network has the same level of security as the least secure device within it, and the responsibility to uphold the security standards of connected devices rests with the manufacturers.

The advantages of the IoT can only be achieved if already in the design phase, the products and services take into account security and privacy requirements, increasing consumer confidence. Greater data circulation necessarily brings greater opportunities for loss or unavailability of the same. Poorly secure products threaten consumer privacy and can be used by criminals to launch large-scale Distributed Denial of Service (DDoS) cyberattacks.

The regulatory standard

The Technical Committee for Information Security of the ETSI (European Telecommunications Standards Institute) has published the ETSI TS 103 645, the standard on IoT products’ security for the consumer world. The document contains recommendations aimed at manufacturers and developers of networkable devices (better known as IoT products) intended for the general public (smart TVs, smartwatches, smart cameras, home automation systems, etc.) and now widespread in every social and production environment. The document, in fact, focuses on the most relevant technical and organizational controls to address the significant and widespread gaps in safety. The goal is to contribute to increasing the security of IoT devices in order to increase consumer confidence at the same time. 

In safety

The new security rules affect a wide range of IoT devices: security products such as smoke detectors and door locks, smart cameras, televisions and speakers, wearable medical devices, home automation and alarm systems, and household appliances (for example, washing machines and refrigerators).

The recommendations indicated in the standard include, for example, avoiding placing devices on the market with usernames and passwords set by default (admin; admin) and identifying contact points to report any new product vulnerabilities.

Other good practices and recommendations to follow can be:

  • the constant release of updates and security patches;
  • the use of secure communication channels;
  • secure storage of access credentials;
  • the minimization of the possible “attack surface” of the devices;
  • the guarantee of software integrity;
  • the resilience of IoT systems to cyber attacks;
  • easy and intuitive deletion of users’ personal data;
  • simplified installation and maintenance of the devices.

It is essential to have a model that relies on other network security methodologies, such as rigorous access controls, network segmentation, and the definition of a “protected surface” that includes data, resources, applications, and services critical to the core business.

Also Read : “Nobody Can Care About My Digital Identity, ” Sure?

TUT TEAM

We are Tech Updates Today Team, a team filled with all the enthusiasts who are 200% passionate to bring all the latest technology news & updates to all our viewers. We also feel that our viewers expect more along with Technology, so we also cover all the latest news and updates on Business, Marketing, and Gadgets.

Recent Posts

How to Delete a Page in Google Docs: A Comprehensive Guide

Google Docs is an internet-based application that allows users to easily create, edit, and collaborate…

2 months ago

How Has AI Revolutionized SOC?

The battle for artificial intelligence is underway in cybersecurity. Between cyberattackers and defenders in organizations,…

8 months ago

The Future of Sports E-commerce is Wild (and Might Empty Your Wallet)

Remember the prehistoric days of battling other fans over the last team slab of plastic…

9 months ago

Best Places To Get Ebooks

The popularity of ebooks has grown exponentially over the past few years, with the online…

10 months ago

Cyber ​​Crises: The Vital Role Of The Pilot

National Information Systems Security Agency created a "crisis pilot" role motivated by the increasing complexity…

10 months ago

Management Software For SMEs

Poor management can become the beginning of the end of your business. To ensure business…

10 months ago