Jump to content
Main menu
Main menu
move to sidebar
hide
Navigation
Main page
Recent changes
Random page
Help about MediaWiki
Special pages
Niidae Wiki
Search
Search
Appearance
Create account
Log in
Personal tools
Create account
Log in
Pages for logged out editors
learn more
Contributions
Talk
Editing
Computer security
(section)
Page
Discussion
English
Read
Edit
View history
Tools
Tools
move to sidebar
hide
Actions
Read
Edit
View history
General
What links here
Related changes
Page information
Appearance
move to sidebar
hide
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
===Internet of things and physical vulnerabilities=== The [[Internet of things]] (IoT) is the network of physical objects such as devices, vehicles, and buildings that are [[Embedded system|embedded]] with [[electronics]], [[software]], [[sensor]]s, and [[Internet access|network connectivity]] that enables them to collect and exchange data.<ref>{{cite web|url=http://www.itu.int/en/ITU-T/gsi/iot/Pages/default.aspx|title=Internet of Things Global Standards Initiative|work=ITU|access-date=26 June 2015|url-status=live|archive-url=https://web.archive.org/web/20150626125229/http://www.itu.int/en/ITU-T/gsi/iot/Pages/default.aspx|archive-date=26 June 2015}}</ref> Concerns have been raised that this is being developed without appropriate consideration of the security challenges involved.<ref>{{cite journal|last1=Singh|first1=Jatinder|last2=Pasquier|first2=Thomas|last3=Bacon|first3=Jean|last4=Ko|first4=Hajoon|last5=Eyers|first5=David|title=Twenty Cloud Security Considerations for Supporting the Internet of Things|journal=IEEE Internet of Things Journal|volume=3|issue=3|date=2015|pages=269β284|doi=10.1109/JIOT.2015.2460333|s2cid=4732406|url=https://dash.harvard.edu/bitstream/1/35349952/1/iot-2016.pdf|url-access=}}</ref><ref>{{cite news|url=https://www.forbes.com/sites/chrisclearfield/2013/09/18/why-the-ftc-cant-regulate-the-internet-of-things/|title=Why The FTC Can't Regulate The Internet Of Things|first=Chris|last=Clearfield|work=Forbes|access-date=26 June 2015|url-status=live|archive-url=https://web.archive.org/web/20150627090938/http://www.forbes.com/sites/chrisclearfield/2013/09/18/why-the-ftc-cant-regulate-the-internet-of-things/|archive-date=27 June 2015}}</ref> While the IoT creates opportunities for more direct integration of the physical world into computer-based systems,<ref>{{cite web | url=https://hbr.org/resources/pdfs/comm/verizon/18980_HBR_Verizon_IoT_Nov_14.pdf |archive-url=https://web.archive.org/web/20150317052909/https://hbr.org/resources/pdfs/comm/verizon/18980_HBR_Verizon_IoT_Nov_14.pdf |archive-date=2015-03-17 |url-status=live | title=Internet of Things: Science Fiction or Business Fact? | work=Harvard Business Review | access-date=4 November 2016}}</ref><ref>{{cite web | url=http://www.internet-of-things-research.eu/pdf/Converging_Technologies_for_Smart_Environments_and_Integrated_Ecosystems_IERC_Book_Open_Access_2013.pdf | title=Internet of Things: Converging Technologies for Smart Environments and Integrated Ecosystems | publisher=River Publishers | access-date=4 November 2016 | first1=Ovidiu | last1=Vermesan | first2=Peter | last2=Friess | url-status=live | archive-url=https://web.archive.org/web/20161012010519/http://www.internet-of-things-research.eu/pdf/Converging_Technologies_for_Smart_Environments_and_Integrated_Ecosystems_IERC_Book_Open_Access_2013.pdf | archive-date=12 October 2016 | df=dmy-all }}</ref> it also provides opportunities for misuse. In particular, as the Internet of Things spreads widely, cyberattacks are likely to become an increasingly physical (rather than simply virtual) threat.<ref>{{cite journal | last=Clearfield | first=Chris | title=Rethinking Security for the Internet of Things | journal=Harvard Business Review | date=2013-06-20 | url=http://blogs.hbr.org/2013/06/rethinking-security-for-the-in/ | archive-url=https://web.archive.org/web/20130920145534/http://blogs.hbr.org/2013/06/rethinking-security-for-the-in/ | archive-date=2013-09-20 | url-status=live }}</ref> If a front door's lock is connected to the Internet, and can be locked/unlocked from a phone, then a criminal could enter the home at the press of a button from a stolen or hacked phone. People could stand to lose much more than their credit card numbers in a world controlled by IoT-enabled devices. Thieves have also used electronic means to circumvent non-Internet-connected hotel door locks.<ref>{{cite web|url=https://arstechnica.com/security/2012/11/hotel-room-burglars-exploit-critical-flaw-in-electronic-door-locks/|title=Hotel room burglars exploit critical flaw in electronic door locks|work=Ars Technica|access-date=23 May 2016|url-status=live|archive-url=https://web.archive.org/web/20160514002208/http://arstechnica.com/security/2012/11/hotel-room-burglars-exploit-critical-flaw-in-electronic-door-locks/|archive-date=14 May 2016|date=26 November 2012}}</ref> An attack aimed at physical infrastructure or human lives is often called a cyber-kinetic attack. As IoT devices and appliances become more widespread, the prevalence and potential damage of cyber-kinetic attacks can increase substantially.
Summary:
Please note that all contributions to Niidae Wiki may be edited, altered, or removed by other contributors. If you do not want your writing to be edited mercilessly, then do not submit it here.
You are also promising us that you wrote this yourself, or copied it from a public domain or similar free resource (see
Encyclopedia:Copyrights
for details).
Do not submit copyrighted work without permission!
Cancel
Editing help
(opens in new window)
Search
Search
Editing
Computer security
(section)
Add topic