The Security Issues of The IoT, Colin Tankard, 2015
The Security Issues of The IoT, Colin Tankard, 2015
11
September 2015 Computer Fraud & Security
FEATURE
Security issues
Figure 2: Device-level IoT security vulnerabilities. Source: HP Fortify.
While the IoT holds much promise,
many security issues have been uncov- UÊ ÃiVÕÀiÊÜiLÊÌiÀv>Vi° taken. Security needs to be built into
ered. Owing to the wide range of sectors UÊ ÃÕvvViÌÊ>ÕÌ iÌV>ÌÉ>ÕÌ ÀÃ>̰ products by design. It cannot be bolted
involved and their impact on everyday UÊ ÃiVÕÀiÊiÌÜÀÊÃiÀÛVið on afterwards. There are moves, such
life, such security issues can have seri- UÊ >VÊvÊÌÀ>ëÀÌÊiVÀޫ̰ as the position being taken by the US
ous consequences, causing damage, UÊ *ÀÛ>VÞÊVViÀð Food and Drug Administration regard-
disruption to operations or, in some UÊ ÃiVÕÀiÊVÕ`ÊÌiÀv>Vi° ing medical equipment, to encourage
scenarios, even loss of life. In a smart UÊ ÃiVÕÀiÊLiÊÌiÀv>Vi° manufacturers and facilities to ensure
building – where systems ranging from UÊ ÃÕvvViÌÊÃiVÕÀÌÞÊVv}ÕÀ>LÌÞ° that appropriate security safeguards are
HVAC (heating, ventilation and air UÊ ÃiVÕÀiÊÃvÌÜ>ÀiÉvÀÜ>Ài° built in from the start of the design
conditioning), lighting and door access UÊ *ÀÊ« ÞÃV>ÊÃiVÕÀÌÞ° process, as well as to remain vigilant
controls, to video surveillance and eleva- This is echoed by recent research regarding new risks and threats as
tors, are all interconnected – a security undertaken by HP Fortify, the findings they are uncovered. This is especially
threat that is exploited to disrupt power of which are shown in Figure 2. Overall, important since it has already been
or lighting could cause loss of life if it it found that 70% of the most com- demonstrated that implantable medical
were something like a hospital. In office monly used IoT devices contain security devices such as pacemakers and defi-
buildings, a door access control that is vulnerabilities and there are an average brillators can be remotely hacked and
hacked could provide an intruder with of 25 security concerns per device. exploits such as changing dosage levels
unauthorised access. Issues with IoT Among the reasons for this is that of insulin pumps have been accom-
devices are far from hypothetical: one many IoT devices are not developed plished from a distance of up to 300
example of a threat is the Stuxnet worm, with security in mind. Many contain metres. As well as this, the University of
which has been seen to be able to dis- embedded software, often proprietary Michigan has shown that the majority
rupt industrial control systems, causing firmware, which is problematic to patch of hospital devices use Windows XP or
extensive damage. and upgrade, leading to vulnerability and Windows 95 operating systems, which
configuration management issues. Many are extremely vulnerable to computer
“A different stance needs devices do not undergo any kind of secu- malware, and many monitoring systems
to be taken. Security needs rity review. According to SANS, just 52% use open wifi connections that can be
to be built into products by of IoT devices undergo security evalua- hacked.
design. It cannot be bolted tions or testing prior to production. Building in security by design means
on afterwards” that controls need to be introduced at
Solving the security the operating system level, should use
A range of security risks have been uncov- the device’s hardware security capabili-
ered in the devices themselves that make up
challenges ties and should extend right up through
the IoT. OWASP has identified the top 10 To solve the security challenges of IoT the device stack to the applications it
such issues involved with IoT devices:2 devices, a different stance needs to be deploys.
12
Computer Fraud & Security September 2015
FEATURE
13
September 2015 Computer Fraud & Security
FEATURE
essential that all procedures and process- But the industrial IoT holds the great- policies in place, and keeping a constant
es are documented, completed in a com- est promise, offering to improve produc- eye over what is connected to their net-
pliant way and an audit trail is generated tivity, ease safety issues and reduce opera- works and how devices are performing.
to provide evidence of the effectiveness tional costs in a wide range of scenarios
of actions taken. and industries. About the author
Figure 3 illustrates the controls that Organisations would be well advised Colin Tankard is managing director of data
organisations currently have in place for to thoroughly research the risks security company Digital Pathways which
controlling IoT devices in the workplace involved in each scenario in which IoT specialises in the design, implementation
according to the SANS Institute. devices are deployed and to communi- and management of systems that ensure the
cate with employees, partners and cus- security of all data whether at rest within
Remain vigilant tomers about security and privacy risks, the network, mobile device, in storage or
especially, where sensitive data is at risk. data in transit across public or private net-
While it could be said that the IoT is still This should include both consumer works.
in its infancy, IoT devices and increased devices that they wish to purchase and
connectivity are being seen across a wide use to interact with corporate informa- References
range of sectors. Many will be familiar tion, as well as how devices used, for 1. Manyika, J; Chui, M; Bisson, P;
with consumer-oriented smart, highly example, in smart buildings should Woetzel, J; Dobbs, R; Bughin, J;
connected devices and these are invad- be closely monitored and maintained. Aharon, D. ‘Unlocking the potential
ing the workplace. Organisations are still One point of failure in a hyper-inter- of the Internet of Things’. McKinsey
grappling with the BYOD phenomenon connected network can initiate a chain Global Institute, June 2015 Accessed
that has an increasing array of person- of events that could have catastrophic Aug 2015. www.mckinsey.com/
ally owned smartphones and tablets consequences. insights/business_technology/
being used for work purposes, creating The IoT appears to be an unstoppable the_Internet_of_things_the_value_
headaches for many in terms of manag- force and the rising tide of devices can- of_digitizing_the_physical_world.
ing them and controlling what sensitive not be turned back. Until security issues 2. ‘OWASP’ Internet of Things Top
data can be accessed. Now this is being are solved, organisations need to be 10 Project’. OWASP. Accessed Aug
extended to wearables such as smart- vigilant, ensuring that they weigh-up the 2015. www.owasp.org/index.php/
watches and health and fitness monitor- security risks against the benefits to be OWASP_Internet_of_Things_Top_
ing devices. gained, putting appropriate controls and Ten_Project.
Everyone seems to be talking about big data lately. The much-vaunted ability
to analyse large diverse data sets very quickly really does appear to have become
the hottest of hot tech topics over the past few years. In fact, big data, despite
being such an over-used term, has even managed to worm its way into main-
stream public consciousness – mainly because of the insights it has been able to claiming that information security is big
afford by finding patterns in what often appears to be unrelated information. data’s killer app. But is there any truth in
such hyperbolic statements? And if so,
what is this future likely to look like? As
Killer app the computer press recently extolling the usual, views are mixed.
In an industry context, meanwhile, a technology’s virtues and dubbing it the According to Peter Wood, chief execu-
raft of glowing articles have emerged in future of cyber-security – or alternatively tive of information security consultancy
14
Computer Fraud & Security September 2015