Five security threats to the Internet of Things that have to be guarded in 2014

The Internet of Things (IoTs) is an important part of the new generation of information technology. As the name suggests, the Internet of Things is the Internet that connects things. The core and foundation of the Internet of Things is still the Internet, which extends and extends the client to anything from the car to the wireless wearables. Cisco's Network Business Solutions team estimates that globally connected devices will double from 12.5 billion in 2010 to 25 billion in 2015.

Focusing on this fast-growing market, chief security officers identified five broad categories of risks that the Internet of Things will face in the coming year, and chief security officers who are aware of these potential threats can plan ahead.

Car WiFi

Car WIFI

According to Visiongain, the revenue of in-vehicle devices in 2013 has reached 21.7 billion US dollars, and will rise further in 2014. According to John Pescatore, Director of Emerging Trends at SANS Research, Ford and General Motors will provide more in-vehicle WiFi in 2014, turning cars into mobile hotspots and connecting passengers’ smartphones, tablets and other devices to the Internet. .

However, in-vehicle wireless networks have the same security vulnerabilities as traditional WiFi hotspots. Without a wireless network firewall, in-vehicle equipment and data will be at risk. Once inside the network, an attacker can spoof the in-vehicle device and be able to connect to an external data source such as the OnStar server and collect the user's PII such as credit card data. As long as hackers have the imagination, they can carry out various types of attacks on car wireless networks, car owners information and devices.

Health equipment / mobile multimedia equipment

Mobile multimedia device

Analysts at the ABI Institute said that the number of wearable devices such as sports, fitness and health care will increase from 42 million in 2013 to 171 million in 2018. In 2014, hackers will increasingly be running Windows systems. Mobile medical devices are attacking, including pacemakers, etc. Traditional manufacturers use proprietary embedded systems, and the limitations of closed source code can hamper hackers. However, non-traditional device manufacturers often use Windows Form, which will greatly increase security risks.

Because Windows is cheap, ubiquitous, and familiar to programmers, it's popular with wearables, Joffe explains. However, unlike Windows on a desktop computer, there is no fix mechanism for Windows for wearable devices. The more devices that connect to the Internet via WiFi, the more viruses are spread.

The existence of a potential malicious attack can lead to a health information vulnerability, so the chief security officer should pay more attention to the remote entry of these devices.

Wearable device Google glasses

Google Glass

According to Visiongain, the global wearable technology market reached a market value of 4.6 billion in 2013 and continued to rise in 2014. Devices, including Google smart glasses, are the primary attack vectors because they automatically connect to the Internet, and there are few security solutions for such devices.

Attacking Google Glass can provide hackers with company confidential information and intellectual property. And companies won't know how much data will be absorbed when Google wearers wear through the office area, or what audio and video they will copy.

“Every business should limit wearables, including when, where, and how to use them,” Irvine said.

Retail Inventory Monitoring M2M

M2M

According to Visiongain, global wireless M2M (Machine to Machine) revenue reached $50.1 billion in 2013. In 2014, inventory management technology will cover more affordable 3G mobile data transmitters. These transmitters will connect to the Internet, making these applications more vulnerable to cyber attacks.

These devices enable detection, collection of statistics, remote management, and a host of other functions. Irvine recommends that companies must configure the security of these inventory control systems and M2M technologies and subdivide them into secure, accessible, and encrypted levels.

(non-military use) drone

Drone

In February 2012, the US Congress introduced several legal provisions for drones. The general principle is that the US Federal Aviation Administration will accelerate the development of UAVs in the next three years. UAVs rely on fragile telemetry signals that an attacker can use to perform any form of attack, including buffer overflows on the UAV firmware, format strings, SQL injection and authentication bypass, Cabetas explained.

In 2012, students at Texas A&M University used technology to hide the GPS signal of the drone and hinted the wrong location data on the navigation computer, causing accidental collisions with the drone. Cabetas mentioned that the most terrible event to date has been the 2012 UAV programming competition. The winner created a virus on the scene that allowed all drones to become infected when approaching an infected drone. Using a single vulnerability in the drone's homogeneous firmware, an attacker can fill the sky with a drone that is always on standby.

The chief security officer should take appropriate physical security countermeasures against uncontrollable drone attacks, and any drone should deploy a security protocol.

As one of the Oil Filled Transformers manufacturers, FGI`s S11 S13 series oil filled transformers have superior performance and remarkable energy-saving effect, reaching the international advanced level. The Oil Filled Transformer has the advantages of no lifting core, free maintenance, easy installation and low operating cost. The coil has low temperature rise, strong overload capability, and the body has a firm structure and strong short-circuit resistance.

Oil Filled Transformers

Oil Filled Transformer,Oil Filled Distribution Transformers,Oil Immersed Transformer,Oil Immersed Distribution Transformer,Liquid Filled Transformers,Oil Immersed Power Transformer

FGI SCIENCE AND TECHNOLOGY CO., LTD , https://www.fgi-tech.com