Section 15.142 Internet of Things (IoT) Flashcards
Objective 3.1 Compare and contrast security implications of different architecture models. Objectives 4.1 Given a scenario, apply common security techniques to computing resources
Internet of Things (IoT)
Network of physical devices with sensors, software, and connectivity
■ Enables data exchange among connected objects
Hub/Control System
Central component connecting IoT devices
The Hub Collects, processes, analyzes data, and sends commands
Can be a physical device like Amazon Echo or Google Home or it can be a software platform like an Android App
Smart Devices
Everyday objects enhanced with computing and internet capabilities
■ Sense environment, process data, and perform tasks autonomously
Wearables
Subset of smart devices worn on the body
■ Monitor health, provide real-time information, and offer hands-free interface
Sensors
Detect changes in environment, convert into data
■ Measure various parameters (temperature, motion, etc.)
■ Enable interaction and autonomous decisions in smart devices
IoT Risks
Weak Default Settings
● Common security risk
● Default usernames/passwords are easy targets for hackers
● Changing defaults upon installation is essential
IoT Risks
Poorly Configured Network Services
● Devices may have vulnerabilities due to open ports, unencrypted communications
● Unnecessary services can increase attack surface
● Keeping IoT devices on a separate network is recommended