10. The Challenges, the Threats and Policy Implications to a Compromised Privacy and Security
Link: https://ieeexplore.ieee.org (Accessed on 01 July 2019)
Abstract:
It is speculated that the 21st-century people are living in the so-called the digital era. It is the era of
technological revolution. For the reason, it is clearly evident that there are a number of things that are now
possible but weren’t in the past days. Even then, we are living in a world where individuals and businesses have
nothing hidden about them. Every detail even the one safeguarded and thought to be uniquely personal is acces-
sible by third parties. Facts and figures have it looking at the past, the present and even in the future that this is
indeed so devastating than ever thought before. Realizing the need and urgency for a comprehensive research,
this study was inspired. The paper synchronizes through the past research literature, advances to enumerate its
methodology of the study, proceeds to the results of the study (which entails the typical IoT model, the threats,
and challenges facing the IoT), the discussion and then the conclusion.
SUMMARY
Whether it is a botnet converting an IoT component into a digital hostage or a ransomware
demanding thousands of dollars in return for locked data, so far, we have discussed how
dierent types of cyber threats can hack into IoT systems Moreover, as you may have noticed a
lot of times these dierent malwares combine to form a coordinated attack which is much more
complex and thus it makes it a lot tougher for the end user to address it.
All of these cyber threats may dier widely in their processes but their objective is the same:
to make their victims lose money, productivity, and reputation.
When an IoT ecosystem of a business is hacked, the end user has to spend a great deal of
money to remove the malware. To do this, they often have to hire a third party company which
not only removes the existing malware but also assesses the security of the complete IoT infra-
structure introduces new practices and solutions to prevent the likelihood of any future attack.
In the aftermath of the attack and during the malware removal process, the company often
faces output issues since either their online systems are shut down due to the breach or they
are forced to close them for the time being. Consequently, the operations of the business are
severely impacted and it loses quite a bit on revenue as their systems remain oine.
Even after battling these troubles, there is the reputation predicament. This problem aects
the business and the device manufacturer both. For the business, it raises credibility on their
cybersecurity vision and they lose their standing in the eyes of their clientele. For the device
manufacturer, questions are raised on why and how the manufacturer was unable to identify
and resolve the security flaw before the cyber attack.
Therefore, if you plan to use IoT devices for residential or commercial purposes, then you
simply cannot ignore the cybersecurity of your IoT system. You can either hire an in-house
team or outsource your security to an experienced firm. Just make sure that a knowledgeable
CISO and a well-experienced team monitors and designs the cybersecurity strategy and vision
of your IoT infrastructure.
In this chapter, we have learnt the following concepts:
• Various security challenges,
• How security attacks take place?
306 Internet of Things
Internet_of_Things_CH11_pp271-308.indd 306 9/3/2019 10:16:21 AM
• What are botnets?
• How IoT devices become the target of Botnets?
• What is Ransomware and how it works?
• How Mirai attacked and its impact?
• What is SPAM Email and how it works?
• What is a man in the middle attack?
• How vehicles can be attacked remotely?
• What is DDoS attack?
• What is IP Spoofing?
• Attack on IP security cameras, and
• Anatomy of an IoT Cyber Attack.
In the next chapter, we will learn about cybersecurity, physical and hardware security,
cryptography, identity management for devices, use of block chains and cryptocurrencies in
IoT, and security best practices.
Chapter 11 Security Challenges for IoT 307
Internet_of_Things_CH11_pp271-308.indd 307 9/3/2019 10:16:21 AM
Internet_of_Things_CH11_pp271-308.indd 308 9/3/2019 10:16:21 AM
Get Internet of Things now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.