continuously noting how cybercriminals have begun to hack into those systems which are
protected by encryption.
NIST published a draft for lightweight cryptography to improve the security of IoT
devices. They believe that conventional enterprise encryption is not secure enough to handle
the modern-day cyber threats in the world. Ideally, the network as a whole must be secure in
order to protect Internet of Things devices. In case a hacker is able to crack an IoT device which
already has a trusted connection with another enterprise, then this can give rise to another
infection surface.
Carefully Choose IoT Vendors
A few years back, a company Aruba was discovered to sell their IoT devices despite knowing
that their certificate and key patterns that were already compromised. Additionally, they knew
about this vulnerability for several years. To avoid such complications with your IoT vendor,
you can deploy Venafi’s solutions or similar ones which can help you to get all of your network
certificates and keys. In case, they get unapproved or compromised, you can revoke them.
Cybersecurity experts believe that this is one of those areas where customers should think
and act better, however, unfortunately, they are not doing much. Analysts believe that users
should go as deep as the level of OEM hardware.
Alter Default Security Settings
While this may seem like routine advice, surprisingly many people fail to adopt it. Not
only individuals but even enterprise professionals do not change the login credentials
of their network devices like routers and keep the same factory settings. Therefore, alter
your router’s default settings. By using strong passwords, you can stop major DDoS and
cyber-attacks.
Exercises
1. List all the cyber attacks you can find in the last 5 years. Figure out the attack pattern and
note down security holes left unattended which led to these attacks.
2. Research on tools that hackers may use to steal passwords and create a chart which
shows the features of these tools and figure out the security measures we need to take to
secure ourselves.
3. Describe a security protocol which can prevent a man-in-the-middle attack.
Review Questions
1. What are cyber security and the role of it?
2. How to manage physical and hardware security?
3. What is cryptography?
4. What is the role of cryptography and how it works?
5. What is blockchain?
6. How blockchain is useful?
7. How identity management for devices work?
8. What are the best security practices?
320 Internet of Things
Internet_of_Things_CH12_pp309-326.indd 320 9/3/2019 10:16:43 AM
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.16.51.3