Information Assurance - 4 Flashcards
- physical devices that are equipped with sensors, software, and internet connectivity.
- These devices can collect and exchange data with other devices and systems over the internet or other networks.
- In simpler terms, it’s about everyday objects becoming smart and interconnected.
Internet of Things (IoT)
The term “Internet of Things” is coined by
Kevin Ashton “The Father of IoT” in 1999.
FEW APPLICATIONS OF IOT
- Building and Home automation
- Manufacturing
- Medical and Healthcare Systems
- Media
- Environmental Monitoring
- Infrastructure Management
- Energy Management
- Transportation
- Better quality of life for the Elderly
Examples of IOT
- Smart Home Devices
- SENSORS
- Wearable technologies
- IoT-Enabled Prosthetics
- Personal Medical Devices
- Smart Inhalers
are electronic devices that are physically worn by individuals in order to track, analyze and transmit personal data
Wearable technologies
These devices - such
as FitBit, Nike FuelBand,
or Withings – generally
communicate using
BlueTooth to
nearby personal
mobile devices.
Consumer products for health monitoring
FOUR CATEGORIES OF NETWORKED MEDICAL DEVICES
- Consumer products for health monitoring
- Wearables
- Internally embedded medical devices
- Stationary medical devices
one that can drive itself from a starting point to a predetermined destination in “autopilot” mode using various in-vehicle technologies.
Autonomous Vehicle
a malicious attempt to exploit vulnerabilities in internet-connected devices, such as smart home devices, industrial control systems, and medical devices
IoT Attack
How does an IoT attack
differ from IT attacks?
- Attack surface
- Diversity of devices
- Physical impact
- Legacy devices
- IoT devices are often designed with limited resources and processing power.
- So they may lack security features to protect against attacks, making them more vulnerable to attacks compared to IT.
Attack surface
IoT devices often have longer lifes. Many older devices will be in use and connected. Legacy devices may not receive software updates or security patches, making them more vulnerable.
Legacy devices
The types of IoT devices vary significantly in form factor,operating systems, and network connectivity. So standardized security measures are more complex, leaving some more vulnerable to attacks than
others.
Diversity of devices
IoT devices are often used in critical infrastructure or life-sustaining systems, such as medical devices, which means that an attack on these devices can have severe physical consequences. In contrast, most IT attacks are focused on stealing data or disrupting services.
Physical impact
Challenges faced by IoT
- Scalability
- Security
- Technical Requirements
- Technological Standardization
- Software Complexity