Page 23 - Cyber Warnings
P. 23







packed for its needs. The IoT systems are not bigger than any other technology obtaining that
role is. Finally, we would come to the ultimate challenge to this technology and that is its
security. As we would previously mention – these systems would get driven using the Internet
communications being wired or wireless which would indicate many vulnerabilities to the
external malware applications.

The typical IoT would rely on so many mechanical, electronic, electrical parts, sensors,
measuring elements and actuating systems that would use some power supply and obtain the
communications using the Internet signal.

Such a communication could be wired or wireless, so it’s necessary to deal with the good
encryption and let’s say – strong passwords.

As it’s illustrated through the Figure above, the same Internet would be used to maintain the
communications over many different devices using that network to deal with each other. We
would figure out here that such openness to the web would make some weaknesses to that
technology making it sensitive to hacker’s attacks.

It’s quite clear how risky it would be if any of smart devices being the part of the IoT’s network
would start behaving in a harmful manner and how such an occurrence could get threatening to
humans.

The purpose of this effort is to clarify the importance of an IoT’s paradigm as well as explain
how threatening to its security could be the fact suggesting it relies on the Internet
communication. Also, it’s quite obvious that if there is no Internet signal, these systems may
appear as quite useless and that could happen through carefully coordinated DDoS attacks.


The security’s challenges of an IoT

Many robotized industrial assets and intelligent computing systems could use the wired web
connections to maintain the communication between those assets and centralized computing
unit, while mobile systems such as cars would not pull the bunches of wires with themselves
trying to maintain the communication with their remote station – they would simply rely on the
wireless solutions.

Anyhow, all of these would be quite risky to the entire system making it vulnerable to all known
hacker’s attacks and cyber incidents. It appears that this new level of sophistication would just
make things being more complicated.

In other words, as it’s convenient to use these cutting edge systems – it can be the real
nightmare if any of these technological solutions would collapse. So, what’s significant to point
out here would be that these systems are so similar as anything relying on the Internet.


23 Cyber Warnings E-Magazine January 2017 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide

   18   19   20   21   22   23   24   25   26   27   28