Q

Mitigating Internet of Things issues and securing the network

Get help securing the network and defending against various Internet of Things issues enterprises are likely to face should IoT come to fruition.

The Internet of Things is a term being thrown around a lot lately. It sounds a lot like Skynet from the "Terminator"

movies, but can you explain what this term means and the extent to which I should be concerned about defending my network from the threats IoT poses?

Ask the Expert

Perplexed about network security? Send us your questions today! (All questions are anonymous)

More of an abstraction than a reality, the Internet of Things is nonetheless a fascinating emerging change in the IT landscape that deserves serious contemplation on the part of security professionals.

What is the Internet of Things and what are some Internet of Things issues? Simply put, it's the term for the increasing number of nontraditional computing devices that are being given some sort of Internet connectivity and hence popping up on consumer and enterprise networks. This could be anything from a high-tech vehicle to a basic household appliance. While this scenario sounds infeasible, take into consideration the proliferation of wireless technologies that society has cultivated over the span of just two decades. If you consider that this exponential advancement in wireless functionality is predicted to continue, the aforementioned infeasibility doesn't sound 100% infeasible.

Recent articles suggest that the security implications of the Internet of Things may already be upon us, mentioning several experiments that have been conducted in lab environments. In one such experiment, a group of researchers hacked into the GPS system of a yacht and remotely steered the yacht off-course.

So, how does a security professional prepare for what's to come? For starters, enterprises should require vendors to assert that their products will not succumb to the issues listed in the OWASP Top 10 list of common application vulnerabilities. Network scanning and enumeration should be done on a frequent basis to account for what exactly resides on a given network, though it remains to be seen whether this will become impractical as the Internet continues to move from IPv4 to IPv6, posing challenges for traditional network-scanning techniques. The basis for this assertion is due to the large number of IP addresses available within IPv6. With that said, I would suggest that enterprises perform frequent penetration testing in the event that the IoT becomes a reality as a supplement to network scanning.

In short, the Internet of Things is definitely a fun concept to speculate about -- and one that infosec may call moderately anxiety-worthy. To best prepare, security professionals should stay up to speed on the latest trends regarding the various wireless technologies and stay vigilant with regard to experimental ones.

This was first published in February 2014

Dig deeper on Emerging Information Security Threats

Pro+

Features

Enjoy the benefits of Pro+ membership, learn more and join.

Have a question for an expert?

Please add a title for your question

Get answers from a TechTarget expert on whatever's puzzling you.

You will be able to add details on the next page.

0 comments

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close