How To Define The Internet of Things – Security First

Define Security First

Given the amount of prose dedicated to the internet of things, it would hardly be foolish to assume that the term is well-defined and well-understood. In reality the opposite is true – professors, tech companies, the media, and individual blogs all disagree on what exactly falls under the umbrella of internet of things.

The problem seems to be that until recently, the internet of things was a relatively niche area. Its gadgets hadn’t yet become mainstream and ubiquitous, all-compassing connectivity was nothing but a glint in the eye of tech giants. However, today the term has become incredibly broad. It includes everything from Apple’s smart watch to city planning and from airport technology to health monitoring. It’s so broad that almost any internet-connected device can reasonably claim to be part of it.

The problem is comparable to that faced by cloud computing five years ago. At the time, the term ‘the cloud’ seemingly referred to everything stored online in some way – as if the entire cloud was one single model. As the market developed and matured, and the adoption of the cloud became increasingly widespread by personal and business users, a more refined set of terminology developed. Today it has been broken down into a number of subsets – for example, PaaS, SaaS, IaaS, etc.

As the internet of things sector matures and the industry develops, we will no longer be able to bundle all these very different things under one generic umbrella term. Much like ‘cloud’ or ‘big data’ in the past, it’s incredibly overused, and to some degree, almost too vague to be useful.

Security

The answer appears to be rooted in security. As with the important distinctions in cloud computing – each which requires the business using the service to negotiate a different balance between trust and control with the cloud provider – a similar set of distinctions must now be made for the internet of things.

After all, it is a significant challenge to establish trust and control across an enormous range of ‘things’, particularly when they are widely distributed, deployed on a scale of millions, and handle highly sensitive data. The information flowing through a network of smart ovens is very different from the information generated by a installation of earthquake detectors. Therefore, it is impossible to discuss to define the internet of things effectively without first breaking it into parts. Failure to separate the IoT into differing levels of security will lead to trying to secure all data on all devices – an impossible task.

How or what those terms may be is a job for skilled professionals – the same professionals who secure nearly every website on the planet and the payment systems we use every day. The coming years should be a fascinating time.

By Daniel Price

David Friend

Tech Evolution – Why Multi-Cloud Will Win

Why Multi-Cloud Will Win When I was growing up in the 1970’s, IBM ruled the roost in corporate data centers. If you walked into a ...
Aruna Headshot

66% Say They’d Switch Vendors in Order to Get an Intelligent Online Meeting Solution

People are getting frustrated with online and video meetings. In fact, according to a recent survey, 85% say they are challenged with these types of ...
Ajay

Explainable Intelligence Part 2 – Illusion of the Free Will

Illusion of the Free Will Explainable Artificial Intelligence (XAI) is getting a lot of attention these days, and like most people, you're drawn to it because ...
Garry Connolly

Data Policy is Fundamental for Trust

Data Policy Trust Consumers once owned and protected their data independent of anyone else. Handwritten letters, paper bank statements, medical records locked up in a ...
Future Fintech

What’s the cloud forecast for 2020?

Tech Agnosticism In 2019, we saw how cloud computing transformed the way data is managed, the way applications are developed and deployed, and also the ...
Patrick Joggerst

From Virtualization to Cloudification: Transforming Networks, Now What?

Virtualization to Cloudification As we head into the next decade of telecommunications network technology transformation, we find ourselves at a pivotal moment as the era ...
Bigcommerce

Magento 1 Is Nearing Its End – Is It Time To Migrate To BigCommerce?

Time To Migrate To BigCommerce? Nearly three years ago, Magento declared that they would be ending support for their Magento 1 software. All versions of ...
Jen Klostermann

FinTech and Blockchain vs Traditional Banking

FinTech and Blockchain Growth "The Rise of FinTech - New York’s Opportunity for Tech Leadership", a report by Accenture and the Partnership Fund for New ...
Brad Thies

System Vulnerabilities Are an Issue for Everyone

System Vulnerabilities Are an Issue for Everyone Over the past decade, we have seen a drastic increase in the number of companies relying on cloud ...
Kyle Bernard Author

FlightHub and JustFly on Facial Recognition Technology, Travel and Privacy

Facial Recognition Technology For years facial recognition technology only existed in science books, television and cinema. The idea was brilliant. However, real-world technology hadn’t yet ...