An introduction to loT security, assaults on loT networks, and the societal repercussions of these attacks

Computer Networking: A Top-Down Approach (7th Edition)
7th Edition
ISBN:9780133594140
Author:James Kurose, Keith Ross
Publisher:James Kurose, Keith Ross
Chapter1: Computer Networks And The Internet
Section: Chapter Questions
Problem R1RQ: What is the difference between a host and an end system? List several different types of end...
icon
Related questions
Question
An introduction to loT security, assaults on loT networks, and the
societal repercussions of these attacks
Transcribed Image Text:An introduction to loT security, assaults on loT networks, and the societal repercussions of these attacks
Expert Solution
Step 1

The Internet of Things (IoT) security plays a centric role with no room for error or shortage on supply in a world with "things" and devices interconnected at every level, from wearables to home and building automation, to smart cities and infrastructure, to smart industries, and to smart-everything. From manufacturers to silicon suppliers (or IP developers), to software and application developers, to the final consumer—the one who will benefit from the security "recipe" that will go along with these IoT products—securing and authenticating these devices will become everyone's top priority. Together, they must innovate and enhance procedures, learn new skills and techniques, raise awareness, and develop new training and curriculum programmes in order to meet market demands.

The Internet of Things (IoT) refers to the interconnectedness of physical objects and devices, which are equipped with sensors and other technology that allow them to collect and exchange data. The data collected by IoT devices can be used to monitor and manage the devices and their surroundings. AI can be used to process and analyze the data collected by IoT devices, in order to identify patterns and insights that can be used to improve the performance of the devices or the systems in which they operate. AI can also be used to provide security for IoT devices and systems. AI-based security solutions can be used to detect and respond to threats in real time, and to protect data and devices from unauthorized access.

IoT Attacks

IoT devices don't have any built-in security protections or software installation capabilities, thus they are virtually "headless." Due to their isolation from larger IT networks and lack of external connectivity, traditional operational technology (OT) settings were unaffected by this constraint. But as technology has developed, so too has the way that IoT ecosystems are connected to business networks and the internet as a whole.

IoT and industrial IoT devices have become a top target for cybercriminals as a result of this enhanced connectedness. Any cyberattack that aims to acquire access to (or control over) IoT devices with the purpose of damaging the devices or using them in assaults against other targets is referred to as an IoT attack.

IoT devices that are online can be compromised by cybercrime organisations and used in large numbers for assaults. Cybercriminals can take control of these devices by planting malware on them, then use their combined processing power to launch DDoS assaults against larger targets, send spam, steal data, or even spy using IoT devices with cameras or sound recorders. Attacks have also been carried out using enormous botnets made up of hundreds of thousands or even millions of IoT devices.

The societal repercussions of these attacks

Compromise IoT devices affect everyone, regardless of income level or smartphone ownership. You might be seen as soon as you leave the house. The CIA recently discussed this issue, claiming that compromised wearables and IP cameras were making it possible to follow the whereabouts of their spies. During President Trump's meetings with Kim Jung-un in Singapore and with Putin in Finland, three articles from F5 Labs were released describing attacks on IoT devices close to him.

Homes have been turned into weapons against us. In addition to the commonly used SOHO routers, DVRs, and IP cameras, other devices such as your TV, oven, refrigerator, Amazon Alexa, Siri, and Google Assistant10, Keurig coffee maker (yes, we have attack traffic coming from a Keurig), and toys11 have been compromised and used to spy, gather information, or launch attacks.

steps

Step by step

Solved in 2 steps

Blurred answer
Recommended textbooks for you
Computer Networking: A Top-Down Approach (7th Edi…
Computer Networking: A Top-Down Approach (7th Edi…
Computer Engineering
ISBN:
9780133594140
Author:
James Kurose, Keith Ross
Publisher:
PEARSON
Computer Organization and Design MIPS Edition, Fi…
Computer Organization and Design MIPS Edition, Fi…
Computer Engineering
ISBN:
9780124077263
Author:
David A. Patterson, John L. Hennessy
Publisher:
Elsevier Science
Network+ Guide to Networks (MindTap Course List)
Network+ Guide to Networks (MindTap Course List)
Computer Engineering
ISBN:
9781337569330
Author:
Jill West, Tamara Dean, Jean Andrews
Publisher:
Cengage Learning
Concepts of Database Management
Concepts of Database Management
Computer Engineering
ISBN:
9781337093422
Author:
Joy L. Starks, Philip J. Pratt, Mary Z. Last
Publisher:
Cengage Learning
Prelude to Programming
Prelude to Programming
Computer Engineering
ISBN:
9780133750423
Author:
VENIT, Stewart
Publisher:
Pearson Education
Sc Business Data Communications and Networking, T…
Sc Business Data Communications and Networking, T…
Computer Engineering
ISBN:
9781119368830
Author:
FITZGERALD
Publisher:
WILEY