The Internet of Things (IoT) encompasses a wide range of interconnected and Internet-connected devices that can collect and transfer data across the network without human intervention. The increase in the use of intelligent technologies leads to greater convenience of the IoT, but it also opens the door to cybersecurity threats.
Reports of cyber breaches are on the rise as the security level of each network has the same level of security as the least secure device within it, and the responsibility to uphold the security standards of connected devices rests with the manufacturers.
The advantages of the IoT can only be achieved if already in the design phase, the products and services take into account security and privacy requirements, increasing consumer confidence. Greater data circulation necessarily brings greater opportunities for loss or unavailability of the same. Poorly secure products threaten consumer privacy and can be used by criminals to launch large-scale Distributed Denial of Service (DDoS) cyberattacks.
The Technical Committee for Information Security of the ETSI (European Telecommunications Standards Institute) has published the ETSI TS 103 645, the standard on IoT products’ security for the consumer world. The document contains recommendations aimed at manufacturers and developers of networkable devices (better known as IoT products) intended for the general public (smart TVs, smartwatches, smart cameras, home automation systems, etc.) and now widespread in every social and production environment. The document, in fact, focuses on the most relevant technical and organizational controls to address the significant and widespread gaps in safety. The goal is to contribute to increasing the security of IoT devices in order to increase consumer confidence at the same time.
The new security rules affect a wide range of IoT devices: security products such as smoke detectors and door locks, smart cameras, televisions and speakers, wearable medical devices, home automation and alarm systems, and household appliances (for example, washing machines and refrigerators).
The recommendations indicated in the standard include, for example, avoiding placing devices on the market with usernames and passwords set by default (admin; admin) and identifying contact points to report any new product vulnerabilities.
Other good practices and recommendations to follow can be:
It is essential to have a model that relies on other network security methodologies, such as rigorous access controls, network segmentation, and the definition of a “protected surface” that includes data, resources, applications, and services critical to the core business.
Also Read : “Nobody Can Care About My Digital Identity, ” Sure?
Now, when you scroll through Instagram, if you come across "ST" and "TM" being used…
Becoming a parent is not only a matter of joy but that of great responsibility…
Work in Nuzillspex Advisors Ltd is a widely accredited financial advisory firm that is distinguished…
Integrating a project accounting system can substantially improve an organization's financial management of projects. These…
Purdue Brightspace is one of the on-premise online learning management systems provided for use among…
Acer has a new line of laptops that are designed for gaming, one of which is…