Menu

M2M FEATURE NEWS

Verizon Report Investigates IoT Vulnerabilities

By Ken Briodagh April 17, 2015

Verizon released its “2015 Data Breach Investigations Report” on April 15, and it says that of the five billion IoT devices predicted by the end of the decade, most will be unitaskers and therefore very difficult to encrypt. The question it asks is whether it even needs to be.

There has not been any substantive breach within the IoT, the report said, so all of its predictions had to be made via conjecture using the best available information.

Some of those predictions are pretty wide-ranging, but they’re also quite conservative. The report predicts increased privacy-related research and exploits from wearables and medical devices. Also that M2M device breaches might become the source of breaches into the larger network and lead to the development of tools like Shodan, designed to take advantages of weaknesses in the IoT.

To avoid vulnerability, the report advocates taking sensible precautions like with any other web-based technology. Perform threat modeling and attack exercises to determine potential attackers and their goals, and then figure out where your sensitive data lives and make sure it’s in a secured area.

Data privacy will be of special concern in the IoT, the report says, because it will be essential to provide privacy protection for everyone in the IoT ecosystem, which can be divided into three levels. Level 3 devices are sensor systems capable of relaying measurements to Level 2 devices, which collect data and transmit organized packages on up the chain. Level 1 devices are fully equipped internetworked devices capable of computation and sophisticated communication and application delivery.

Only data that is absolutely necessary should be gathered, if maintaining privacy is of concern. Furthermore, consent and access control rules should be built in and data should not be transferred to third parties for other purposes without explicit approval. Ideally, all data should be transferred and retained in an encrypted and anonymous format. Finally, safeguards against theft should include keeping Level 3 devices to sensing and relaying capability and Level 2 and Level 1 devices, including the intercommunication channels, should be highly secure systems.

One worrisome area cited in the report is the fact that many of the existing vulnerabilities still are not being addressed, and they’ve been open for years. It said that in 60 percent of breaches, attackers are able to compromise an organization within minutes, but many cyber attacks could be prevented through a more vigilant approach to security.

In short, there’s vulnerability, but no one’s taking advantage yet. Perhaps someone should fix the holes before the flood gets here. 




Edited by Maurice Nagle
Get stories like this delivered straight to your inbox. [Free eNews Subscription]

Editorial Director

SHARE THIS ARTICLE
Related Articles

Beyond the Closet, Connecting to IoT

By: Gary Audin    11/11/2020

Two challenges arise when considering cable based IoT.

Read More

Banyan Security Enhances Secure Remote Access for Engineering Resources

By: Ken Briodagh    10/27/2020

Banyan's Continuous Authorization Can Grant or Revoke Access to Sensitive Engineering Environments and Applications in Real-time Based on TrustScore

Read More

Senet Eyes RAN Partnerships as Key to Delivering Network Services for Massive IoT

By: Arti Loftus    10/21/2020

To meet the challenges that come with providing network connectivity for IoT solutions, Senet is executing a strategy for massive IoT that will be bui…

Read More

mimik Selected by 5G Open Innovation Lab to Drive Early Adoption of 5G

By: Ken Briodagh    10/15/2020

mimik's patented Hybrid Edge Cloud platform will boost the performance and reduce the cost of 5G Networks

Read More

5G Sets New Standards for Vertical Industries' IoT Connectivity

By: Special Guest    10/13/2020

As 5G rolls out across the world, vertical industries across IoT are working on additional standards to make the technology suitable for their industr…

Read More