A-Z Popular Blog IoT Search »
Technology
 Advertisements
Related Guides
Information Technology

4 Examples of IoT Security

 , updated on
Internet of things (IoT) is the introduction of sensors, computing and networking into vehicles, infrastructure, appliances, fashion, architecture, medical devices and everyday objects. This presents a unique security challenge in several ways:

Cheap Devices

If it's common for expensive enterprise software to have security vulnerabilities, it may be far more likely for security vulnerabilities to occur in inexpensive products designed and manufactured by companies outside of the IT industry. This can create armies of weak devices for denial of service attacks. It can also compromise individual privacy on a large scale leading to a range of economic, political, cultural and public security issues.

Physical Security

In the past, most cyber attacks have been confined to information environments. The Internet of Things provides an avenue for attacks to take on physical dimensions such as crashing vehicles, sending commands to medical devices, locking people in their homes or taking over a city's physical infrastructure.

Scale

IoT may lead to many trillions of devices connected to the internet. Such devices may be extraordinarily diverse with a broad range of vulnerabilities. As such, the cost of securing these devices and damages due to attacks could theoretically become a significant cost to economies.

Chilling Effects

It may become quite common for a person to be surrounded by 1000s of IoT devices at home, work, in transit and everywhere else. If there is any perception at all that such devices are monitored by governments and others, people may live under a constant and oppressive feeling of being watched. This will likely have significant social, cultural and economic impacts.
Overview: Iot Security
Type
Definition
The practice of defending connected physical devices and infrastructure from unauthorized access, use, disclosure, disruption, modification or destruction.
Related Concepts
More about IoT:
Big Data
Bots
Embedded System
Event Processing
Firmware
Geofencing
Intelligent Things
IoT Security
Pervasive Computing
Privacy By Design
Sensor Competition
Smart Cities
Smartdust
Swarm Intelligence
System Of Systems
Telecommand
More ...
If you enjoyed this page, please consider bookmarking Simplicable.
 

Security vs Privacy

The relationship between security and privacy.

Hardening

An overview of technology hardening.

Deep Magic

An overview of deep magic, a technology term.

Defense In Depth

An overview of defense In depth.

Encryption Examples

A definition of encryption with examples.

Canary Trap

A definition of canary trap with an example.

Honeypot

A definition of honeypot with examples.

Security Through Obscurity

A definition of security through obscurity with an example.

Tokens

A definition of token with examples.

Backdoor

A definition of backdoor with examples.

Internet Of Things

A list of technologies, techniques and issues related to internet of things (IoT).

IoT Examples

A definition of internet of things with examples.

Sensors

A list of common sensors used in electronics, vehicles, robotics, infrastructure, smart cities and everyday items.

IoT vs Control

The internet of things and control.

Pervasive Game

Games that extend into the real world.

Intelligent Things

The definition of intelligent things with examples.

Context Awareness

The common types of context awareness.

Proximity Awareness

The definition of proximity awareness with examples.

System on a Chip

A definition of system on a chip with examples.

IoT vs Embedded Systems

The difference between IoT and embedded systems.
The most popular articles on Simplicable in the past day.

New Articles

Recent posts or updates on Simplicable.
Site Map