Using the Internet of Things is merely an objective which requires 100 percent conviction
so one can use their complete processing power and manage their resources better. It carries
the key to create a world where connected cars are continuously communicating with their
creators in order to avert the possibility of an automobile flaw or inform whenever it requires a
repair. On a similar note, refrigerators can be used to order groceries.
With the Internet of Things, you can take control of many daily chores in your home. For
instance, you can turn on/turn o your air conditioner, adjust the lightning, or watch TV via
a TV remote. While this is a wonderful and highly promising glimpse of IoT, you also have to
contend with the risk of vulnerabilities and concerns regarding access points.
For hackers, simply logging into your IoT ecosystem can gain them entry to your home
and access things were not theirs too, begin with. Thus, turning to cybersecurity is absolutely
necessary if you want to escape the malicious mechanisms of cybercriminals.
PHYSICAL AND HARDWARE SECURITY
The fragmented and distributed IoT nature makes up for a bigger attack surface proximity to the
IoT components. When these factors are combined, they raise a potent and dangerous threat.
History is full of cyber attacks where weak physical security leads hackers to enter the network
of a company which then snowballs into a much bigger cyber threat.
For instance, consider a company which has installed a system where fingerprint
authentication provides identity access to their users. If a cybercriminal manages to identify a
loophole in the authentication mechanism then they can have access to personal information
(like names, social security numbers, and residential details), financial information (like credit
card details), and other key sensitive information. This remote cyber attack can help them steal
data from hundreds of IoT devices with a similar authentication mechanism.
Arm has recommended looking over four vulnerability types which they believe must be
studied during the development of a SoC: System-on-Chip. These are communication, lifecycle,
physical, and software. In case, any of the vulnerabilities are exploited, it can lead to the com-
promise of the complete IoT infrastructure. Thus, it is essential to make sure all the mandatory
security measures are assessed and applied at the very start of IoT development.
What Is Physical Security?
Known also by the name of hardware or silicon security, physical security emphasizes on
securing a system’s silicon element. There is a key for the proximity to the device. It is impor-
tant to note that while software-based attacks are engineered from remote locations, physical
attacks need closer proximity.
Before going into physical security, first, you have to reflect how your IoT infrastructure
gets compromised because of it. For instance, suppose there is an Internet of Things
deployment like connected street lights. The management has implemented an Advanced
Encryption Standard (AES) for the firmware updates delivery. The objective of such measures
is to ensure that only the authentic stakeholders—one with the secret keys of AES—is allowed
What are the areas one should consider while implementing cyber security?
Flash Question
310 Internet of Things
Internet_of_Things_CH12_pp309-326.indd 310 9/3/2019 10:16:42 AM
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.147.65.65