Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Wednesday, 7 June, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

"Aware" Government encouraged to lead on IoT challenge

by The Gurus
September 11, 2014
in Editor's News
Share on FacebookShare on Twitter

Security for the Internet of Things (IoT) must be fixed for the long term, and requires top-level guidance.
 
According to Beecham Research, the potential damage to people, possessions, businesses and national critical infrastructure from a successful attack on cyber-physical systems through the IoT cannot be underestimated.
 
Professor Jon Howes, one of the authors of the report and technology director at Beecham Research, said that devices must be securely managed over their entire lifecycle, to be reset if needed and to enable remote remediation to rebuild and extend security capabilities over time.
 
Speaking at a launch event for the research in London, Howes said that the industry needs to move faster than standards, and needs to be done rapidly. He said: “We have to assume devices will be compromised and deny attacks, and make sure there are methods to reset and refuse failures when attacks succeed. Attacks have little impact on daily lives, but attackers still get away with it.
 
“Security is the major challenge for IoT, and we require a holistic approach and extend essential encryption to both at rest and in flight, as well as adding interoperability for authentication and authorisation to fit into the IoT architecture. Mostly we need to work together, as these things go in place and stay there for ten years. There is a big need and impact to put security in place.”
 
Beecham believes the answer to these challenges lies at the architectural level for both devices and systems, and stretches from semi-conductors through to network operators and system integrators. This approach underlines the need for common security objectives across the industry and interoperability within broad systems.
 
This first report is the first significant component of a longer study that includes substantial industry collaboration – covering silicon device vendors and extending across all major industry stakeholders – followed by publication of frameworks for an array of use cases.
 
The report also highlights potential future attacks on IoT systems and how these may ultimately impact users, from home owners losing control of white goods, door locks being disengaged or security alarms being monitored.
 
Haydn Povey, Technical Associate at Beecham Research, said: “We know from IT that the wheels come off when it comes to security, and if Government cannot define it they will get the blame for it.
 
“It needs standards and certification and problem is they are relatively slow moving and the problems need to be fixed faster than that. We need to focus on users, and managing devices in your home – how do you add a new appliance into IoT over next six years? Enable a broad stream to build and enable these systems.”
 
He went on to say that as we build more complex systems, we need to know how we will solve these problems. “This is not about laying down rules for IoT, but all nodes and devices need to be secure to ensure trust and privacy,” he said. “The problems for the long term are with lifecycle management, this is key as we need to play on fact that we are fallible and complexity means we will get it wrong, and we have to be lucky all of the time while an attacker only has to be lucky once.
 
“What happens if we are infected? We cannot go out and replace things as we did with Heartbleed. These things have to live for a long time and exploits change daily, so how are we supposed to know what to fix? We have to support expectations and move security from a burden to a value creation, as people won
‘t pay for security but will pay for what security enables.”
 
Povey concluded by saying that security will drive the adoption of IoT, as it is a key enabler and needs to be in there. Asked who should be leading on IoT security, Povey said that Government recognise the problem, and say it is an “accident waiting to happen”.
 
He said: “In some ways this is the coalition of the living and CTOs of security companies, not silicon companies who are putting rules into IT, not IoT. We are trying to close the loop, and job of this report is to do this. It is not just crypto, it is remediatable systems and assuming we are fallible and how manage it.”

FacebookTweetLinkedIn
ShareTweet
Previous Post

44CON – I am The Cavalry contemplate name change and encourage new members

Next Post

Irish healthcare provider selects FireEye

Recent News

large open office, bright.

Employees Feel 10 Times Calmer in an Environmentally Friendly Office Space

June 7, 2023
Blue Logo OUTPOST24

Outpost24 Acquires EASM Provider Sweepatic

June 7, 2023
Standard post, logos of brands, headshot.

J Brand: The Challenges of Putting Mental Health First in an Unfamiliar Industry

June 6, 2023
iPad with Anxiety written on it in capitals.

Half of UK Employees Suffer From “Sunday Scaries”

June 6, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information