Access and Feeds

Internet of Things (IoT) and Security: Increasingly Complex Device Connectivity Means that Security Strategies Need to be More Adaptive and Scalable

By Dick Weisinger

Protecting your computer from malware and viruses has been hard, but as technologies like the Internet of Things (IoT) gain popularity and as computers are increasingly embedded into everything from clothing to refrigerators, the world of cybersecurity is becoming much more formidible.

Ernst and Young estimates that by 2020 there will be more than 50 billion devices connected to the Internet.  New automobiles, for example, already typically have anywhere from several dozen to hundreds of embedded microprocessors. Connected devices are showing up everywhere, like medical implants, airplanes, smart meters, sensors, and many other devices.

The problem is that the security of many of these many embedded devices is simply poor or non-existent.  The Ernst and Young report, for example, said that “in the rush to market, the main goal for many providers has been to generate revenues through sales, rather than focusing on long term cyber resilience of their devices.”

Carlo Kristle G. Dimarucut, Senior Director at SGV & Co., said that “as consumers, we should understand that the majority of IoT devices are amalgamations of old technologies that have been given new functions and communication channels. This means that these technologies, many of which use stripped down versions of known operating systems with new interfaces, may contain old vulnerabilities.”

The Ernst and Young report concluded that “the cyber workforce simply cannot scale in line with additional device connectivity, as budgets for cyber are not unlimited, businesses will increasingly seek to develop adaptive, scalable solutions to match their changing network landscape.”

Digg This
Reddit This
Stumble Now!
Buzz This
Vote on DZone
Share on Facebook
Bookmark this on Delicious
Kick It on
Shout it
Share on LinkedIn
Bookmark this on Technorati
Post on Twitter
Google Buzz (aka. Google Reader)

Leave a Reply

Your email address will not be published. Required fields are marked *