In this section we will focus more on how the Internet of Things works, what it is and how to defend against cyber attacks on our not-computing related devices.
What is the Internet of Things?
This is a collection of devices that are not typically identified as computers. They can be anything from light bulbs connected to a home automation system, domestic appliances, sensors on industrial plant, as well as autonomous cars and the components that make up non-autonomous cars including Satellite Navigation, automated braking systems, etc. The danger from these devices is that they often do not require any form of authentication to operate and run on outdated embedded software that is not maintained by the vendor. This also extends to the services these devices use to provide their function, e.g. in the case of a door bell/door monitoring system there will be a subscription service that performs that monitoring and provides the owner of alerts when someone comes to the door.
This is typically abbreviated to the acronym IoT.
I also extend IoT to normal computing devices, e.g. Laptops, PC’s, Phones, Tablets, since they are all part of the same canvas, although they have different defence and security strategies
Guidance specific to IoT
- Security Concerns Regarding Smart Energy Meters
- Using Wearable Technology Safely – A Pocket Guide
- Simple Overview of IoT
- Securing your Internet of Things
- Electronic Payments
- Securing your Smartphone/Mobile Device.
- Securing your Online Accounts
- Email Tracking
- The Dangers of using Unsupported Hardware an Software
- Precautions to take with USB Devices
- Using Free and Public WiFi.
Headline image provided by ShutterStock