Three Myths About The Internet Of Things And Security

Holiday Photos.png
Growing Up.png
Data Fallout.png
The Report.png
Byod.png

Internet Of Things Myths

Privacy and security is a hot topic at the moment. From heartbleed to the NSA and from government spying to Obama’s State of the Union address, it seems everyone is keen to have their say on what they think security and privacy in the online world should look like. It’s no wonder, therefore, that there are a lot of myths and untruths circulating. Here we look to debunk some of them…:

Myth 1: The private sector is capable of meeting security challenges by itself

President Obama and Prime Minister Cameron have drawn praise and derision in equal measure in recent weeks. Not long ago they stated they thought the government should have more ability to access private online communications to help combat terrorism – some regarded their views as sensible, while others took serious umbrage with the idea of the state having yet more intrusion into our privacy.

The truth is the private sector is unlikely to be capable of meeting the increasing challenges by itself. Whether or not you agree with the concept of state intervention, at the very least the private sector needs help in facilitating an information exchange that contributes to the public good. Ultimately individual companies are probably not motivated to care about the public good without guidance from public policy – though public policy will only be effective with proper feedback of what’s working and what’s not from researchers, enterprises and users.

Myth 2: More security means less privacy

Technically, security and privacy appear to be two sides of the same coin; both rely on encryption, both use design processes to help ensure their protection, and both suffer similar types of failures.

However, there is a distinction. Privacy is about providing information into a system and not being personally harmed by doing so, security is about creating value and then protecting that value. The recent IEEE Summit on Internet Governance saw several speakers claim we were currently dealing with security versus privacy, when in fact we should be looking at security blended with privacy. By taking the view of one versus the other, we do not allow the technical community to accurately describe the choices society is facing. Collectively we have to find practical levels of security and privacy that work in a cost effective way – not choose one over the other.

Myth 3: Traditional software security will work for the internet of things

One of the biggest challenges for the internet of things is getting the message to new adoptees that traditional, desktop security strategies will not work very well.

Methods that are now common practice among desktop users – such as rolling monthly updates, new software releases, and security patches – are not necessarily practical for the IoT, where some devices and technologies could be in place for many years before they are replaced or upgraded.

Scale is also an issue; where IT networks may traditionally comprise of hundreds, maybe thousands of devices, the number of IoT devices will dwarf it and continue to grow exponentially. Companies will be stepping into a world we they experienced before and that they haven’t engineered for – the dynamics are an unknown.

By Daniel Price

Threat Security

Azure Red Hat OpenShift: What You Should Know

Azure Red Hat OpenShift: What You Should Know What Is Azure Red Hat OpenShift? Red Hat OpenShift provides a Kubernetes platform for enterprises. Azure Red Hat OpenShift permits you to deploy fully-managed OpenShift clusters in ...
Ronald van Loon

The Future of Work: Confronting One of the Biggest Challenges of the Next Decade

The Future of Work Technologies like artificial intelligence (AI), machine learning (ML), and automation in all of its forms can augment human workers and enable them to pivot to more valuable work, and perform their ...
Data Web Accessibility

Protecting Yourself from the Rise in Ransomware this Holiday Season

Rise in Ransomware The Baltimore Public Schools system was already dealing with pandemic learning conditions when it was hit by a ransomware attack the day before Thanksgiving. School officials were calling it a "catastrophic attack ...
A.i Robot Brain

What Everyone Is Missing About The Tesla Bot

The Tesla Bot A few weeks ago Tesla unveiled the latest mad creation spawned from the head of Elon Musk at their most recent AI conference. Previous greatest hits include “why can't we reuse our ...
Data Web Accessibility

Data Centres Of The Future

Data Centres Of The Future As humans require more and more computing power and more and more cloud storage, we’re going to need more and more data centres. So what do the data centres of ...

TECH ELEARNING

The CloudTweaks technology lists will include updated resources to leading services from around the globe. Examples include leading IT Monitoring Services, Bootcamps, VPNs, CDNs, Reseller Programs and much more...

  • Plural Site

    Pluralsite

    Pluralsight provides online courses on popular programming languages and developer tools. Other courses cover fields such as IT security best practices, server infrastructure, and virtualization.

  • Isc2

    ISC2

    (ISC)² provides IT training, certifications, and exams that run online, on your premises, or in classrooms. Self-study resources are available. You can also train groups of 10 or more of your employees. If you want a job in cybersecurity, this is the route to take.

  • App Academy

    App Academy

    Immersive software engineering programs. No experience required. Pay $0 until you're hired. Join an online info session to learn more

  • Cybrary

    Cybrary

    CYBRARY Open source Cyber Security learning. Free for everyone, forever. The world's largest cyber security community. Cybrary provides free IT training and paid IT certificates. Courses for beginners, intermediates, and advanced users are available.