• Welcome to the Online Discussion Groups, Guest.

    Please introduce yourself here. We'd love to hear from you!

    If you are a CompTIA member you can find your regional community here and get posting.

    This notification is dismissable and will disappear once you've made a couple of posts.
  • We will be shutting down for a brief period of time on 9/24 at around 8 AM CST to perform necessary software updates and maintenance; please plan accordingly!
K

Kathleen Martin

Guest
The internet of things (IoT) has truly come of age, and innovative new use cases are emerging all around us. Each day, we’re seeing the IoT in businesses and factories, cities, vehicles and transportation systems—and in our daily lives. Studies show that in consumer markets like fitness, healthcare, automobiles, and the home, the IoT market is expected to register a CAGR of 17.52% during the forecast period of 2021-2026.
For commercial environments, 40% of participants in an Eclipse Foundation survey said that their organizations are using IoT solutions today, and 22% more plan to deploy IoT in the next two years.
However, if we take a closer look at the internet of things, some hidden threats emerge. It’s evident that many manufacturers rushing to get their products to market are bypassing the important step of security. Many are often taking shortcuts that are putting their devices at risk when they go into the field to support real-world use cases.
To complicate the issue, almost every IoT device has three key inherent vulnerabilities. The first is authentication. The IoT is all about connecting to other things, so authenticating the right users and anything the device connects to is essential. 
Confidentiality is the second common vulnerability in IoT devices. The IoT is also based on generating new data that becomes actionable. If that data is not protected, it’s useless, so ensuring confidentiality is a must.
Finally, it is important to know that the data that’s being generated and collected by these devices can be trusted. Additionally, knowing the device is operating in a state of integrity and configuration settings haven’t been manipulated is also important. Data integrity becomes the third common vulnerability amongst these devices. 
Continue reading: https://securityboulevard.com/2022/01/rising-above-complexity-to-secure-iot-devices/
 

Attachments

  • p0006628.m06276.vulnerable_iot_770x300.jpg
    p0006628.m06276.vulnerable_iot_770x300.jpg
    55.7 KB · Views: 36
  • Like
Reactions: Kathleen Martin