GLOBAL RESEARCH SYNDICATE
No Result
View All Result
  • Login
  • Latest News
  • Consumer Research
  • Survey Research
  • Marketing Research
  • Industry Research
  • Data Collection
  • More
    • Data Analysis
    • Market Insights
  • Latest News
  • Consumer Research
  • Survey Research
  • Marketing Research
  • Industry Research
  • Data Collection
  • More
    • Data Analysis
    • Market Insights
No Result
View All Result
globalresearchsyndicate
No Result
View All Result
Home Data Collection

IoT Security | Pipeline Magazine

globalresearchsyndicate by globalresearchsyndicate
November 17, 2020
in Data Collection
0
IoT Security | Pipeline Magazine
0
SHARES
7
VIEWS
Share on FacebookShare on Twitter

By: Rob Spiger

IoT security is becoming an imperative. By 2021, it is forecast that 35 billion Internet of Things (IoT) devices will be installed worldwide, a number expected to grow to over 75 billion by 2025,
according to Security Today. The IoT revolution will increase the number of
computing devices by orders of magnitude. However, these devices will be built from the same imperfect software that we use today, and manual remediation will be much less practical or even
unfeasible due to devices being too numerous, too inaccessible, or simply lacking a suitable interface. 

As people increasingly rely on connected devices to make their everyday lives easier, it is imperative that device manufacturers and architects incorporate a security by design approach to
protect the device throughout its whole lifecycle, from conception right through to the end of its lifetime. If security is an afterthought for developers, the device presents a vulnerable point
for hackers to access or tamper with large amounts of personal or operational data being processed by the device and shared with the cloud. The impact of such a vulnerability can be hugely
detrimental.

All Internet-connected devices should be designed to protect themselves against network-based attacks. As such, device vendors must employ a wide range of hardware and software-based protection
technologies to keep devices secure. Unfortunately, bugs and misconfigurations still lead to damaging exploits despite this. Furthermore, recovering a badly compromised computing device today
usually involves manual intervention. For example, a new firmware or operating system must be loaded from an external storage device or a second computer before then being re-joined to network
services using passwords or other credentials, often under conditions of physical security.

Technologies that support reliable and secure remote computer management and recovery are already available for more costly devices. For example, service processors or baseboard management
controllers (BMCs) are employed to manage desktops and servers, and intelligent backplanes are used to manage blades in data centers. However, these technologies are either unsuitable or
inefficient for IoT due to their cost, form factors, power needs, or the lack of an out-of-band management channel.

For devices to be secured from the start, it is imperative that developers have a robust starting point to work from. With many complexities and vulnerabilities within IoT devices, it is
essential to have the ability to identify where these vulnerabilities are and a foundation for understanding how they can be best safeguarded.

The National Institute of Standards and Technology (NIST) is ensuring that engineers have the best tools to support the resilience of platforms against potentially destructive attacks with the
three principles stated in its Platform Firmware Resiliency Guidelines (NIST SP 800-193). It outlines a collection of fundamental hardware and firmware components needed to boot and operate a
system to protect the platform against unauthorized changes, detect unauthorized modifications that occur and recover from attacks rapidly and securely.

Within the protection principle, the guidelines outline mechanisms for ensuring that platform firmware code and critical data remain in a state of integrity and are protected from corruption,
such as the process for ensuring the authenticity and integrity of firmware updates. The document also defines mechanisms for detecting when platform firmware code and critical data have been
corrupted, leading to the recovery principle. During this process, the guidelines summarize the mechanisms for restoring platform firmware code and critical data to a state of integrity in the
event that they are detected to have been corrupted, or when forced to recover through an authorized mechanism. The recovery aspect is limited to the ability to recover firmware code and critical
data.

This standard provides a set of baseline security provisions for all consumer IoT devices. It is intended to be complemented by other standards, defining more specific provisions and requirements
for testing and full verification, such as the principles and technologies set out by the Trusted Computing Group’s (TCG) upcoming
Cyber Resilient Module and Building Block Requirements specification.

This specification defines a minimal set of hardware and firmware capabilities or mechanisms that enable cyber-resilient devices to be built, even at the lowest end of the cost, performance and
complexity spectrum. This includes IoT devices and microcontrollers used in a wide range of applications. It also supports more complex devices by providing resilient capabilities to
subcomponents of devices that may have their own computing resources, critical firmware and critical data.

Related Posts

How Machine Learning has impacted Consumer Behaviour and Analysis
Consumer Research

How Machine Learning has impacted Consumer Behaviour and Analysis

January 4, 2024
Market Research The Ultimate Weapon for Business Success
Consumer Research

Market Research: The Ultimate Weapon for Business Success

June 22, 2023
Unveiling the Hidden Power of Market Research A Game Changer
Consumer Research

Unveiling the Hidden Power of Market Research: A Game Changer

June 2, 2023
7 Secrets of Market Research Gurus That Will Blow Your Mind
Consumer Research

7 Secrets of Market Research Gurus That Will Blow Your Mind

May 8, 2023
The Shocking Truth About Market Research Revealed!
Consumer Research

The Shocking Truth About Market Research: Revealed!

April 25, 2023
market research, primary research, secondary research, market research trends, market research news,
Consumer Research

Quantitative vs. Qualitative Research. How to choose the Right Research Method for Your Business Needs

March 14, 2023
Next Post
Global Lapis Lazulis Market Research Report 2020 with Covid-19 Impact Analysis by Manufacturers, Regions, Type and Application, Forecast to 2026

Latest Study: Aerospace and Defense Telemetry Market Research Report 2020 – 2026 with Covid-19 Impact Analysis

Categories

  • Consumer Research
  • Data Analysis
  • Data Collection
  • Industry Research
  • Latest News
  • Market Insights
  • Marketing Research
  • Survey Research
  • Uncategorized

Recent Posts

  • Ipsos Revolutionizes the Global Market Research Landscape
  • How Machine Learning has impacted Consumer Behaviour and Analysis
  • Market Research: The Ultimate Weapon for Business Success
  • Privacy Policy
  • Terms of Use
  • Antispam
  • DMCA

Copyright © 2024 Globalresearchsyndicate.com

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT
No Result
View All Result
  • Latest News
  • Consumer Research
  • Survey Research
  • Marketing Research
  • Industry Research
  • Data Collection
  • More
    • Data Analysis
    • Market Insights

Copyright © 2024 Globalresearchsyndicate.com