This shows you the differences between two versions of the page.
| Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
| en:iot-open:security_and_privacy_in_iot_ume:iot_security [2019/05/25 23:14] – irena.skarda | en:iot-open:security_and_privacy_in_iot_ume:iot_security [2020/07/20 12:00] (current) – external edit 127.0.0.1 | ||
|---|---|---|---|
| Line 1: | Line 1: | ||
| + | ====== | ||
| + | <box # | ||
| + | <box # | ||
| ====== IoT Security and Privacy====== | ====== IoT Security and Privacy====== | ||
| + | <box # | ||
| + | <box # | ||
| **// Concept of information security and its importance. //** | **// Concept of information security and its importance. //** | ||
| Line 5: | Line 10: | ||
| There are two approaches to the determination of the concept of “information security”: | There are two approaches to the determination of the concept of “information security”: | ||
| - | - **Information security** – the status of the safety of information resources and the protection of the legitimate rights of the personality and society in the information sphere. | + | - **Information security** – the status of the safety of information resources and the protection of the legitimate rights of the personality and society in the information sphere. |
| - | + | ||
| - **Information security** – is a process of support for confidentiality, | - **Information security** – is a process of support for confidentiality, | ||
| - | **Confidentiality**: Ensuring | + | **Confidentiality** |
| - | **Integrity**: Support | + | **Integrity** |
| - | **Accessibility**: Ensuring | + | **Accessibility** |
| The properties given above are fundamental bases in the sphere of protection and safety of information. | The properties given above are fundamental bases in the sphere of protection and safety of information. | ||
| Line 19: | Line 23: | ||
| **Safety of information** – a status of the security of data in the case of which their confidentiality, | **Safety of information** – a status of the security of data in the case of which their confidentiality, | ||
| - | Safety of information is defined by absence of the unacceptable risk connected to information leakage on technical channels, unauthorised and inadvertent impacts on data and (or) on other resources of an automated information system used in the automated system. ((R. Minerva, and A. Biru, " | + | Safety of information is defined by the absence of the unacceptable risk connected to information leakage on technical channels, unauthorised and inadvertent impacts on data and (or) on other resources of an automated information system used in the automated system |
| To understand what activities for the support of information security consist of, it is necessary to understand the value of three major concepts clearly: risk, threat and vulnerability. | To understand what activities for the support of information security consist of, it is necessary to understand the value of three major concepts clearly: risk, threat and vulnerability. | ||
| - | **The risk of information security** | + | **The risk of information security** |
| - | **The threat** | + | **The threat** |
| - | **Vulnerability** | + | **Vulnerability** |
| - | In case of the appearance of new information technologies and furthermore the whole information branches, there is a vast number of potential threats and vulnerabilities which shall be probed correctly. Indeed, the Internet of Things did not become an exception. ((H. Reza Ghorbani, M. Hossein Ahmadzadegan, | + | In case of the appearance of new information technologies and furthermore the whole information branches, there is a vast number of potential threats and vulnerabilities which shall be probed correctly. Indeed, the Internet of Things did not become an exception |
| - | The recent report of Gartner predicts that by 2020 20,4 billion devices will be connected to IoT, and at the same time will be joined every day by 5,5 million new devices. Besides, by 2020 more than a half of sizeable new business processes and systems will include the IoT component. | + | The recent report of Gartner predicts that by 2020, 20.4 billion devices will be connected to IoT, and at the same time will be joined every day by 5,5 million new devices. Besides, by 2020, more than half of sizeable new business processes and systems will include the IoT component. |
| - | These digits are suprising | + | These digits are surprising |
| Line 44: | Line 48: | ||
| In November 2016 ((https:// | In November 2016 ((https:// | ||
| - | Even if you take reasonable measures of the safety of IoT, your connected gadgets can be compromised by criminals. Last fall the DSN Dyn-Internet service provider got under the attack which broke access to favourite websites. Attackers could take under control a large number of the devices connected to the Internet, such as video recorders and cameras. These devices | + | Even if you take reasonable measures of the safety of IoT, your connected gadgets can be compromised by criminals. Last fall the DSN Dyn-Internet service provider got under the attack which broke access to favourite websites. Attackers could take under control a large number of devices connected to the Internet, such as video recorders and cameras. These devices |
| - | + | ||
| - | IoT gives the almost infinite opportunities for connection of our devices and the equipment. From the point of view of creativity, this field is widely opened, with the endless set of methods “to connect devices”. It can become the ample platform for people with the innovative ideas, but also it concerns also malefactors. Therefore, IoT offers both new opportunities for development, | + | |
| + | IoT gives the almost infinite opportunities for connection of our devices and the equipment. From the point of view of creativity, this field is widely opened, with the endless set of methods “to connect devices”. It can become an ample platform for people with innovative ideas, but also it concerns also malefactors. Therefore, IoT offers new opportunities for development and potential security concerns. | ||