Unit-6 (Securing IoT Systems)
Unit-6 (Securing IoT Systems)
The consequences of IoT security breaches can be highly damaging. This is because the Internet
of Things affects both virtual and physical systems. For example, think of a smart car connected
to the internet – cybercriminals could hack it to disable certain safety features. As the IoT
becomes more prevalent within industry – hence the term IIoT or Industrial Internet of Things –
cyberattacks can unleash a series of potentially devastating consequences. Similarly, in
healthcare – where the term IoMT or Internet of Medical Things is used – devices can expose
sensitive patient data or even compromise patient safety. In smart homes, compromised devices
could allow criminals to monitor people’s homes.
Following the Covid-19 pandemic, remote working has increased around the world. While IoT
devices have helped many users to work from home, often home networks can lack the security
of organisational networks. The increased usage has highlighted IoT security vulnerabilities.
Complex environments
Research shows that in 2020, the average household in the US had access to 10 connected
devices. All it takes is one overlooked security misconfiguration in one single device to put the
whole household network at risk.
When buying an IoT device, check that the vendor provides updates and consistently apply them
as soon as they become available. Software updates are an essential factor in IoT device security.
Devices that use out-of-date IoT software are easier for hackers to compromise. Your IoT device
may send you automatic updates, or you might have to visit the manufacturer’s website to check
for them.
Change default passwords on IoT devices
Many people use the same login and password for every device they use. While it's easier for
people to remember, it's also easier for cybercriminals to hack. Make sure every login is unique
and always change the default password on new devices. Avoid using the same password across
devices.
Use strong passwords for all devices and your Wi-Fi network
A strong password is long – made up of at least 12 characters and ideally more – and contains a
mix of characters, such as upper- and lower-case letters plus symbols and numbers. Avoid the
obvious – such as sequential numbers ("1234") or personal information that someone who knows
you might guess, such as your date of birth or pet's name. A password manager can help you to
keep track of your login credentials.
Change your router’s name
If you keep the router name given by the manufacturer, it could allow snoopers to identify the
make or model. Instead, give your router a new name – but make sure that whatever you choose
doesn’t disclose any personal identifiers such as your name or address.
Use a strong Wi-Fi encryption method
Using a strong encryption method for your router settings – i.e., WPA2 or later – will help to
keep your network and communications secure. Older WPA and WEP versions are vulnerable
to brute force attacks. You can read more about WPA versions here.
Set up a guest network
If your router gives you the option, consider creating a guest wireless network, also using WPA2
or later, and protected with a strong password. Use this guest network for visitors: friends and
family may be using devices that have been compromised or infected with malware before using
your network. A guest network helps to enhance your overall home network security.
Check the privacy settings for your IoT devices
Your IoT devices probably come with default privacy and security settings. It’s a good idea to
read through these and change the settings where appropriate to ensure they are set to a level you
are comfortable with. In a similar vein, it’s worth reviewing privacy policies to understand how
the provider stores and uses your personal data.
Keep track of device available features and disable the unused features
Check the available features on your devices and switch off any that you don't use to reduce
potential attack opportunities. For example, consider a smartwatch – its primary purpose is to tell
the time. But it will probably also use Bluetooth, Near-Field Communication (NFC), or voice
activation. If you are not using these features, they provide more ways for an IoT hacker to
breach the device, with no added benefit for the user. Deactivating these features reduces the risk
of cyberattacks.
Enable multi-factor authentication where possible
Multi-factor authentication (MFA) is an authentication method that asks users to provide two or
more verification methods to access an online account. For example, instead of simply asking for
a username or password, multi-factor authentication goes further by requesting additional
information, such as an extra one-time password that the website's authentication servers send to
the user's phone or email address. If your smart devices offer MFA, use it.
Understand what IoT devices are on your home network
Review all devices communicating across your network and understand what they do. Some of
these devices may now be older models – consider whether upgrading to newer devices could
offer greater IoT security features.
Be careful when using public Wi-Fi
You might want to manage your IoT devices through your mobile device when you're out and
about – for example, in a coffee shop, shopping mall, or airport. It's essential to be aware of the
security risks involved in using public Wi-Fi. One way you can mitigate these risks is by using a
VPN.
By being mindful of IoT cyber security and following IoT security best practice, it is possible to
minimize risks.