Here is a first one that suggests 6 that could affect enterprise security. Nothing new but lists the key concerns in one place.
According to the article:-
1. The IoT will create billions of new (insecure) end points
A vast majority will have little to no protection against common online attacks. The operating system, firmware and patch support that IT organizations have long been accustomed to, will not always be available with these devices.
2. The IoT will inevitably intersect with the enterprise network
Regardless of whatever network segmentation techniques and air gaps that an enterprise might employ, there will be points where the IoT will intersect with the enterprise network. Those touch points will be highly vulnerable to attack.
If you can hack into a web-enabled device which also happens to have connectivity to the corporate network or infrastructure, you can create a bridge to pass traffic back and forth," from the enterprise, Yoran said.
3. The IoT will be a world of heterogeneous, embedded devices
The IoT universe will be very different from the layered software model to which IT and IT security groups are so accustomed.
For one thing, the devices themselves will be highly heterogeneous and IT will have a hard time getting everyone to use the same technology, Pescatore said.
4. The IoT will enable physical and physiological damage
Hackers have already shown how IP-enabled insulin pumps, glucose monitors and pacemakers can be compromised to cause physiological damage to the wearer of such devices. Attacks like those enabled by Stuxnet show how physical equipment can be damaged via cyberattacks.
With the IoT, such attacks will also be possible against such products as cars, smart heating, ventilation and air conditioning systems, Web-enabled photocopiers, printers and scanners and virtually every other device with an IP address. The only reason that attackers haven't gone after such devices already in a major way is because there is so much other low-hanging fruit to attack, Sutton said.
5. The IoT will create a new supply chain
"Like BYOD, traditional enterprises will need to adapt to developing policy and systems that integrate with and potentially manage many more devices than IT has ever worked with before,"
6. The IoT will exacerbate the volume, stealth and persistence of online attacks
Companies that have experience managing complex technology integrations will be the ones most likely to succeed in an IoT environment,
The IoT includes every device that is connected to the Internet.Dealing with the sheer scale of the problem could be a huge challenge for IT organizations.
The link below has more information:-
No comments:
Post a Comment