TECHNOLOGY

IoT: What Is Security For Smart Devices?

The Internet of Things (IoT) encompasses a wide range of interconnected and Internet-connected devices that can collect and transfer data across the network without human intervention. The increase in the use of intelligent technologies leads to greater convenience of the IoT, but it also opens the door to cybersecurity threats.

Reports of cyber breaches are on the rise as the security level of each network has the same level of security as the least secure device within it, and the responsibility to uphold the security standards of connected devices rests with the manufacturers.

The advantages of the IoT can only be achieved if already in the design phase, the products and services take into account security and privacy requirements, increasing consumer confidence. Greater data circulation necessarily brings greater opportunities for loss or unavailability of the same. Poorly secure products threaten consumer privacy and can be used by criminals to launch large-scale Distributed Denial of Service (DDoS) cyberattacks.

The regulatory standard

The Technical Committee for Information Security of the ETSI (European Telecommunications Standards Institute) has published the ETSI TS 103 645, the standard on IoT products’ security for the consumer world. The document contains recommendations aimed at manufacturers and developers of networkable devices (better known as IoT products) intended for the general public (smart TVs, smartwatches, smart cameras, home automation systems, etc.) and now widespread in every social and production environment. The document, in fact, focuses on the most relevant technical and organizational controls to address the significant and widespread gaps in safety. The goal is to contribute to increasing the security of IoT devices in order to increase consumer confidence at the same time. 

In safety

The new security rules affect a wide range of IoT devices: security products such as smoke detectors and door locks, smart cameras, televisions and speakers, wearable medical devices, home automation and alarm systems, and household appliances (for example, washing machines and refrigerators).

The recommendations indicated in the standard include, for example, avoiding placing devices on the market with usernames and passwords set by default (admin; admin) and identifying contact points to report any new product vulnerabilities.

Other good practices and recommendations to follow can be:

  • the constant release of updates and security patches;
  • the use of secure communication channels;
  • secure storage of access credentials;
  • the minimization of the possible “attack surface” of the devices;
  • the guarantee of software integrity;
  • the resilience of IoT systems to cyber attacks;
  • easy and intuitive deletion of users’ personal data;
  • simplified installation and maintenance of the devices.

It is essential to have a model that relies on other network security methodologies, such as rigorous access controls, network segmentation, and the definition of a “protected surface” that includes data, resources, applications, and services critical to the core business.

Also Read : “Nobody Can Care About My Digital Identity, ” Sure?

TUT TEAM

We are Tech Updates Today Team, a team filled with all the enthusiasts who are 200% passionate to bring all the latest technology news & updates to all our viewers. We also feel that our viewers expect more along with Technology, so we also cover all the latest news and updates on Business, Marketing, and Gadgets.

Recent Posts

SEO Instant Appear Highsoftware99.com – Does It Really Help Pages Index Faster?

A lot of people who operate websites want to find ways to get their site…

5 days ago

What Is Fashionisk .com and Is It Worth Your Time?

A lot of folks want to know what Fashionisk .com is all about and if…

2 weeks ago

Fappelo: Features, Benefits, and How It Helps Content Creators Work Faster

Fappelo is an online platform that enables users to create, manage, and organize their content…

3 weeks ago

What Is SSIS 469? Meaning, Where It Appears, and What You Should Do

If you ever encountered SSIS 469, you probably found it in one of your system…

1 month ago

Charfen.co.uk Explained: Is It Legit and Safe to Use?

Charfen.co.uk is an online resource offering content across Business, Technology, Lifestyle, and General Information. The…

1 month ago

EducationBeing com: A Simple Platform That Makes Learning Easier

EducationBeing.com, a free online educational resource, provides students, teachers, and parents with easy access to…

2 months ago