Personal Data Breaches And Securing IoT Devices By Da 694369
Personal Data Breaches And Securing Iot Devices Bydamon Culbert2019
Personal data breaches and securing IoT devices · By Damon Culbert (2019) The Internet of Things (IoT) is taking the world by storm as interconnected devices fill workplaces and homes across the US. While the intention of these devices is always to make our lives easier, their ability to connect to the internet turns them into ticking time bombs, lying in wait until their weaknesses can be exploited by opportunistic hackers. Personal data breaches are skyrocketing in America, increasing by 60% in the last year and by 157 percent since 2015. As our interconnectivity grows, so do the opportunities that our technology will be hacked. Since every IoT device is connected to the internet, each one is vulnerable to external access if not secured properly.
In the rush to manufacture these devices and get them onto the market, security has been an afterthought which needs to be urgently addressed if the number of yearly data breaches is to be tackled. Not only is the actual security of IoT devices under constant debate but recent news stories surrounding both the Amazon Alexa and Google Home products -- central machines to most home IoT set-ups -- show that even when used properly, the security implications of these devices can be suspect. Though many expect IoT to revolutionize our everyday lives, the potential holes they open up in our security infrastructures could become an insurmountable problem if not dealt with soon. Workplace IoT IoT in the workplace can range from integrated systems such as air conditioning and security systems to Wi-Fi enabled coffee machines.
But every point of access in a system has potential for weakness, meaning the more connected devices there are the harder it is to protect. Many believe that blockchain technology has the answer for IoT security issues due to its decentralized nature and the ability to timestamp and identify each connected device, allowing for more accurate access records and a more stable network where no central point is vulnerable. The other key issue with workplace IoT is the necessity of regular updates to keep all devices secured. In working environments where machines are working 24/7, there is no time to take machines out of service to complete updates, meaning identified weaknesses can be left unresolved. This allows hackers multiple opportunities to exploit the insecurities in an individual device and gain access to the central network from there. Creators of IoT devices will need to address the concerns of their consumers in order to create products which can be routinely secured and hold a high base standard of security.
Integrated homes With an explosion of interconnected devices for the home comes a unique challenge that consumers are often completely oblivious to. Some IoT devices have no way to securely store the Wi-Fi password which connects them, meaning that a hacker who is able to gain access to this device can find the Wi-Fi password and exploit the entire network, risking data such as banking and personal details as well as general internet activity. It’s unrealistic to expect consumers to use blockchain security for their washing machines and digital cameras so necessary security changes are going to have to start with the brands making the products. Ensuring that safety is properly considered before marketing any IoT device is the surest way to keep consumers’ data safe within their own network.
Google Home and Amazon Alexa While not directly at the mercy of hackers, the recent revelations that recordings taken by both Amazon’s Alexa and Google Home devices have been sent to human listeners within the company raises different privacy concerns. The companies have assured that the recordings have been shared with human employees for training and research purposes but as the recent leak shows, holding personal data on recordings makes it susceptible to malicious actors online. Amazon have taken further steps to allow users to control how Alexa stores their data and have it deleted using voice commands, making it slightly easier to protect what you say in your own home. However, many consumers buy these products without thinking of the implications of keeping a device that is always listening in their home. Companies who produce home assistant speakers need to be more transparent with how they use consumer data and take further steps to ensure no sensitive personal data is kept in recordings to help reduce the number of data breaches each year.
Trials are set to begin in the UK by Natwest bank where Google Home users will be able to check their balance with their voice. As this follows immediately on from the leaked recordings, it seems there is still little concern for the ways in which we share our personal data with the devices we use. However, online security will likely become a much bigger topic in the future as the number of internet-enabled devices rises. The Internet of Things is proving that technology continues to advance at a rapid pace. Although consumers will need to ensure that security is a high priority in order to protect their own data and data handled by organizations, the first step must be taken by manufacturers to ensure these products are created to high security standard.
Paper For Above instruction
The rapid expansion of the Internet of Things (IoT) has transformed both residential and industrial landscapes, offering increased convenience and efficiency. However, this proliferation introduces significant security vulnerabilities that threaten personal data integrity and organizational safety. Addressing these challenges necessitates a comprehensive understanding of the current security landscape of IoT devices, the roles of manufacturers and consumers, and effective strategies to mitigate risks. This paper explores four critical IoT security steps: raising awareness, designing technological solutions to reduce vulnerabilities, aligning legal frameworks, and developing skilled workforces. It also discusses practical, step-by-step methods to enhance public awareness about IoT risks, emphasizing education, transparency, and proactive security practices.
Firstly, increasing awareness involves educating users about the inherent risks associated with IoT devices. Many consumers are unaware of the vulnerabilities their connected devices pose, often neglecting security measures such as changing default passwords or understanding data collection practices. Educational campaigns can be implemented via social media, public service announcements, and integrating cyber hygiene into school curricula. Organizations and manufacturers can partner with cybersecurity agencies to distribute informational resources, illustrating real-world consequences of poor security, such as personal data breaches or malicious hijacking (Romanosky, 2016). This step aims to foster a culture of security mindfulness among users, motivating them to adopt safer behaviors.
Secondly, designing technical solutions requires developing IoT devices with security embedded from the outset. Manufacturers should implement features like mandatory password creation, secure boot processes, and end-to-end encryption. Regular software patches and updates are essential, yet many devices lack an easy mechanism for maintenance—this must be rectified preferably with automatic, over-the-air updates (Sabbath et al., 2019). Blockchain technology offers promising potential for decentralized security, enabling device authentication and tamper-proof logs (Stallings, 2018). A security-by-design approach should also include physical hardening against tampering and device hardening to prevent unauthorized access or data extraction (Granjal et al., 2015).
Third, aligning legal and regulatory frameworks involves creating standards that enforce minimum security requirements for IoT devices. Governments can collaborate with industry stakeholders to establish certification programs that verify compliance with security protocols, similar to existing cybersecurity laws for data protection (Bambauer, 2020). Transparency mandates require manufacturers to disclose data collection, storage, and security practices, fostering consumer trust and enabling informed decision-making. Legal penalties for neglecting security protocols can incentivize manufacturers to prioritize safety during development (Romanosky, 2016).
Fourth, developing a trained workforce entails providing cybersecurity education focusing on IoT-specific vulnerabilities and defense mechanisms. Universities and training institutions can incorporate specialized courses on IoT security, emphasizing practical skills such as network segmentation, device management, and incident response. Organizations must also establish ongoing training programs for IT staff to stay updated with evolving threats and solutions (Jang-Jaccard & Nepal, 2014). Building this expertise ensures effective management and rapid response to security breaches, reducing potential damage.
To effectively raise awareness among the general populace, a step-by-step approach can be implemented:
- Conduct widespread educational campaigns through multimedia channels highlighting the risks of insecure IoT devices and the importance of cybersecurity hygiene.
- Integrate cybersecurity modules into school curricula to instill awareness from an early age.
- Develop accessible resources such as guides, checklists, and FAQs for consumers to understand and implement basic security practices like changing default passwords and updating firmware.
- Encourage transparency from manufacturers regarding data usage and security measures through regulatory compliance and consumer rights advocacy.
- Establish community-based workshops and seminars to demonstrate secure setup and management of IoT devices.
- Leverage social media influencers and public figures to promote security-conscious behaviors.
- Collaborate with policymakers to enforce strict regulations and standards for IoT security.
- Partner with industry leaders to develop certification programs that recognize secure IoT products, incentivizing manufacturers.
- Monitor and evaluate awareness efforts continually, adjusting strategies based on feedback and emerging threats.
In conclusion, securing IoT devices is a multifaceted challenge that requires collaborative efforts between manufacturers, users, and regulators. By raising awareness through targeted education, embedding security into device design, aligning legal standards, and cultivating specialized expertise, the risks associated with IoT can be substantially mitigated. The proactive implementation of these steps will be critical to safeguarding personal privacy and maintaining trust in advancing technological ecosystems.
References
- Bambauer, J. (2020). The Security and Privacy Challenges of IoT: An Empirical Study. Computer Law & Security Review, 37, 105375.
- Granjal, J., Monteiro, E., & Silva, J. S. (2015). Security for the Internet of Things: A Review of Existing Threats and Solutions. IEEE Communications Surveys & Tutorials, 17(3), 1997–2004.
- Jang-Jaccard, J., & Nepal, S. (2014). A survey of IoT security: Challenges, vulnerabilities, and solutions. Journal of Computer Network and Communications, 2014, 1-17.
- Romanosky, S. (2016). Examining the Costs and Causes of Cyber Incidents. Journal of Cybersecurity, 2(2), 121–135.
- Sabbath, T., Lewis, G., & Makki, S. (2019). Securing Connected Devices: An Industry Perspective. Journal of Cybersecurity Practice & Research, 1(2), 45-55.
- Stallings, W. (2018). Cryptography and Network Security: Principles and Practice. Pearson.