This shows you the differences between two versions of the page.
| Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
| en:iot-open:security_and_privacy_in_iot_ume:iot_security [2018/03/01 12:10] – kap2fox | en:iot-open:security_and_privacy_in_iot_ume:iot_security [2020/07/20 12:00] (current) – external edit 127.0.0.1 | ||
|---|---|---|---|
| Line 1: | Line 1: | ||
| - | ===== IoT security | + | ====== |
| + | <box # | ||
| + | <box # | ||
| + | ====== IoT Security | ||
| + | <box # | ||
| + | <box # | ||
| **// Concept of information security and its importance. //** | **// Concept of information security and its importance. //** | ||
| - | There are two approaches to determination of the concept | + | There are two approaches to the determination of the concept |
| - | **1. Information security** | + | - **Information security** |
| - | | + | |
| - | **2. Information security** is a process of support | + | |
| - | **Confidentiality**: Ensuring | + | **Confidentiality** |
| - | **Integrity**: Support | + | **Integrity** |
| - | **Accessibility**: Ensuring | + | **Accessibility** |
| The properties given above are fundamental bases in the sphere of protection and safety of information. | The properties given above are fundamental bases in the sphere of protection and safety of information. | ||
| - | **Safety of information** | + | **Safety of information** |
| - | Safety of information is defined by absence of the unacceptable risk connected to information leakage on technical channels, | + | Safety of information is defined by the absence of the unacceptable risk connected to information leakage on technical channels, |
| - | To understand | + | To understand what activities for the support of information security consist |
| - | **The risk of information security** | + | **The risk of information security** |
| - | **The threat** | + | **The threat** |
| - | **Vulnerability** | + | **Vulnerability** |
| - | In case of appearance of new information technologies and furthermore the whole information branches, there is a huge number of potential threats and vulnerabilities which shall be probed | + | In case of the appearance of new information technologies and furthermore the whole information branches, there is a vast number of potential threats and vulnerabilities which shall be probed |
| - | The recent report of Gartner predicts that by 2020 20,4 billion | + | The recent report of Gartner predicts that by 2020, 20.4 billion |
| - | These digits | + | These digits |
| - | Need of more reliable measures for protection of the built-in devices IoT was confirmed with the recent research Forrester TechRadar in which use options, the business value and perspectives for 13 most important and important technologies of safety of IoT were defined. It included the main technologies, | ||
| - | <figure Ref.Pic.1> | + | For the last few years, many widespread cyber attacks showed risks of the inadequate safety of IoT. Perhaps, the attack of “Stuxnet” aimed at the industrial programmable logic controllers (PLC) at the Iranian uranium enrichment plant became the most known. Experts read that Stuxnet destroyed up to 1000 centrifuges connected through broadband networks to the PLCs devices working under control of the Windows operating system at the PCs standard platforms. |
| - | {{ : | + | |
| - | < | + | |
| - | </ | + | |
| + | In 2016 was many serious attacks directed to IoT devices. Mirai botnet became one of such attacks. This specific a bot network infected numerous IoT devices (first of all old routers and IP cameras) and then used them for superimposing of Dyn DNS provider utilising the DDoS-attack. The botnet of Mirai destroyed Etsy, GitHub, Netflix, Shopify, SoundCloud, Spotify, Twitter and some other the large websites. This piece of the malicious code used the devices using outdated versions of a kernel of Linux and relied on the fact that most users do not change names users/ | ||
| + | Many companies reduce the costs of production, not including sufficient space for storage on the devices to provide updating of a kernel Linux. Because of it, kernels which include vulnerabilities work on many IoT devices. Vendors need to learn this lesson and to allow each device to update regularly kernels. Until this problem is solved, IoT devices will still suffer from the weight of exploits. | ||
| + | In November 2016 ((https:// | ||
| - | For the last few years many widespread cyber attacks showed risks of inadequate safety of IoT. Perhaps, the attack of " | + | Even if you take reasonable measures of the safety of IoT, your connected gadgets can be compromised by criminals. Last fall the DSN Dyn-Internet service provider got under the attack which broke access to favourite websites. Attackers could take under control a large number of devices connected to the Internet, such as video recorders and cameras. These devices |
| - | + | ||
| - | In 2016 was many serious attacks directed to IoT devices. Mirai botnet became one of such attacks. This specific a bot network infected numerous IoT devices (first of all old routers and IP cameras), and then used them for superimposing of Dyn DNS provider by means of the DDoS-attack. The botnet of Mirai destroyed Etsy, GitHub, Netflix, Shopify, SoundCloud, Spotify, Twitter and some other the large websites. This piece of the malicious code used the devices using outdated versions of a kernel of Linux and relied on the fact that most of users do not change names users / passwords by default on the devices. | + | |
| - | + | ||
| - | Many companies reduce costs of production, not including sufficient space for storage on the devices to provide updating of a kernel Linux. Because of it kernels which include vulnerabilities work on many IoT devices. Vendors need to learn this lesson and to allow each device to update regularly kernels. Until this problem is solved, IoT devices will still suffer from weight of exploits. | + | |
| - | + | ||
| - | In November, 2016 cybercriminals closed heating of two buildings in the city of Lappeenranta, | + | |
| - | + | ||
| - | Even if you take reasonable measures of safety of IoT, your connected gadgets can be compromised by criminals. Last fall the DSN Dyn-Internet service provider got under the attack which broke access to popular web sites. Attackers could take under control a large number of the devices connected to the Internet, such as video recorders and cameras. These devices | + | |
| - | + | ||
| - | To tell the truth, IoT gives the almost infinite opportunities for connection of our devices and the equipment. From the point of view of creativity this field is widely opened, with the infinite set of methods "to connect devices" | + | |
| + | IoT gives the almost infinite opportunities for connection of our devices and the equipment. From the point of view of creativity, this field is widely opened, with the endless set of methods “to connect devices”. It can become an ample platform for people with innovative ideas, but also it concerns also malefactors. Therefore, IoT offers new opportunities for development and potential security concerns. | ||