IoT Vulnerabilities & Risk Mitigation
Guest WriterGuest Writer
Whether at home or in business, the world of IoT (theĀ Internet of Things) devices and machines has become an integrated part of our daily lives and is expected to not only increase in presence but to rapidly increase penetration into municipal, government and military uses in the future.
Think about it ā your smartphone, your tablet, smart TVs, refrigerators, HVAC systems, security cameras, coffee makers, printers, and wearables such as FitBit and iWatches are increasing in presence, while at the same time becoming a major security concern for CISOs in business, government and the military.
According to IDC projections, there will be over 80 billion āsmartā IoT devices within the next seven years. Unfortunately, the networks and the software running these connected devices are extremely vulnerable to attacks. The numerous distributed denial-of-service botnet attacks of late are the best examples of how hackers can manipulate a feeble IoT security policy to gain access to organizationsā data or even shut down operations entirely. Examples include the 2016 Dyn cyberattacks, the 2015 Jeep hack, the St. Jude Cardiac Devices hacks that started from 2014, and more.
One of the reasons that itās difficult to see IoT devices on the network is because they are either grouped in with all of the other connected devices on the network, or worse ā sometimes they are not assigned a specific group policy due to their ubiquitous purposes and this leaves these devices free to roam around the network.
If there isnāt a team member or department that is specifically assigned to manage the devices or an automated management system programmed to manage and monitor, the responsibility for ensuring the devicesā security status and authorized areas of access is left up in the air. The result is typically that IoT devices become āfree agentsā of sorts that can easily be used by hackers and other malicious actors.
Unmonitored devices are opening the organization to unwarranted access. When these IoT devices gain network access, they have a foot in the organizationās mainframe and breaches can happen.
Additionally, IoT devices typically come with default passwords. Many users, even after the 2016 Dyn cyberattacks, stay with the default settings and do not bother to set a unique username and password. Hackers can find lists of vulnerable devices and try out default passwords. If those have never been changed ā they are in. Even if the passwords have been changed, hackers can use SSH and telnet services that unfortunately allow hackers to force their way into devices. Changing a deviceās web application password typically does not guarantee that the password coded into the device has been updated.
These risks and others can be eliminated to some degree by maintaining a current and detailed inventory of all IoT devices located at the factory locations, offices, government plants, etc. The inventory can be updated via a mobile device management system or network access control technologies and then verified on a bimonthly basis. The more that is known about the devices on the network, the better the organization will be able to effectively respond to IoT security breaches.
In February 2018, the National Institute of Standards and Technology released their draft of āInteragency Report on Status of International Cybersecurity Standardization for the Internet of Things (IoT)ā. It was concluded in this report that it is necessary to have a standardized set of cybersecurity requirements to prevent malicious actors from exploiting security gaps to launch cyberattacks.
Additionally, there are legislative efforts underway in the United States designed to regulate certain standards of IT security for IoT systems in the government. The report came out along with several international initiatives to set IoT standards, such as in China and Europe, that placed USA agencies and industry in a race of sorts to set international baseline security standards for all connected devices.
The NIST report noted that cybersecurity for IoT is indeed a unique venture that requires tailoring of existing standards as well as the adoption of new ones to address pop-up network connections, shared system components, the ability to change physical aspects of the environment and related security connections.
The report concluded that without these standards, IoT systems would have gaps in too many areas, including: cryptographic techniques, incident management, network security, information security management systems, software assurance and more.
Written by Amber Jones, Freelance Writer
The Most Comprehensive IoT Newsletter for Enterprises
Showcasing the highest-quality content, resources, news, and insights from the world of the Internet of Things. Subscribe to remain informed and up-to-date.
New Podcast Episode
Recent Articles