IDC Research claims that 90 percent of businesses which are planning to add IoT in their
repertoire are likely to face a hack on their IoT networks.
When an organization is illegally accessed, and its devices are remotely controlled, the
eect on the entire ecosystem can vary greatly. Hence, to ensure that security is fully instilled,
it is compulsory to incorporate cybersecurity measures from the start of a process that is, the
sensors and IoT equipment and adding it in the chain of IoT components ending at the user
interface.
To combat these security doldrums, Microsoft came up with a threat classification model
called STRIDE (Spoofing, Tampering, Repudiation, Information Disclosure, Distributed Denial
of Service, and Elevation of Privilege).
Data Sensitivity
Traditionally, organizations were not too transparent about their use of consumer data. Data
was collected from clients and processed for multiple purposes where the client had no idea if
his personal and sensitive details were misused.
2018 has been an important year for data privacy. Earlier this year two main incidents
occurred:
European Union enforced the mandatory regulation called GDPR (General Data
Protection Regulation)—an extensive set of rules and regulations focused to provide
utmost protection of data for EU residents. Whether a business is located in an EU state
or not, as long as their client-base consists of EU residents; the business must comply
with GDPR regulations or may face penalties and fines for non-compliance.
Another incident was a much-publicized controversy where one of the most well-
known IT name, Mark Zuckerberg, had to answer questions in a Congress testimony.
Questions were asked about his widely popular social media platform, Facebook and its
compliance with data regulations to gain insights about Facebook’s use of social media
profiles.
These data sensitivity concerns are equally crucial for IoT networks where it has to be made sure
that the collected data does not cause any privacy violation. Management has to mull over the
following questions:
What type of data are the IoT sensors and equipment gathering?
How is the data going to be securely stored?
Who are the users in the organizations that have the required access to this data?
How will the integrated components of the ecosystem process the data?
Scalability
With the passage of time, as organizations earn profits and generate greater revenues, their net-
work of devices do not remain of the same size. Ultimately, more devices have to be integrated
into the system. Likewise, other than the IoT hardware; data is another factor which will grow
exponentially. This rapid expansion requires IoT ecosystems to be scalable that is, newer com-
ponents can be easily added while the increased workload can also be managed eectively. Some
IoT frameworks like Microsoft Azure IoT consider these factors and provide “auto-scalability
for organizations to build powerful IoT solutions in an aordable budget.
44 Internet of Things
Internet_of_Things_CH02_pp027-054.indd 44 9/3/2019 10:12:44 AM
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.22.248.208