IoT - The Next level of Terrorism
When someone mentions the term IoT (Internet of Things), our faces light up like that of a kid who’s been given a new toy to play with. We’re asking questions like how IoT is revolutionizing the world and how it’s making our day to day lives better when the real question we should be asking is, are our existing IoT framework and compliance standards completely addressing our security needs from something more dangerous than anything we’ve seen before - Cyber Terrorism?
Simply
put, hacking into the location data on a car is merely an invasion of privacy
aka data theft, whereas hacking into the control system of a car would be a threat to life and is considered cyber terrorism.
Let’s
look into a few examples of how radicals are using such a promising technology
to cause chaos and destruction. Here’s a few ‘what-ifs' with things that are
automatically controlled over the internet:
Scenario-1: What
would happen if all the fans supporting the ventilation system for underground
subway or long tunnels connecting cities stopped working?
Scenario-2: What would happen if a vehicle loses its control or
malfunctions? What if this happened to all vehicles across the city
simultaneously?
Scenario-3: What would happen if synchronized traffic lights are not
working as they should?
Scenario-4: What would happen if all the transformer blow out at the same
time?
Scenario-5: What would happen if the cooling fans at data centers fail?
Scenario-6: What would happen if a hospital’s medical device’s real-time
diagnosis results are manipulated?
Scenario-7: What would happen if the home security alarm in every home in
a city starts sending distress signals at the same time?
What
would happen if all the above scenarios take place at the same time in a city like
Manhattan?
- Huge defeat to the human race
- Economic loss – A loss that would make it near impossible to come out of
- Chaos, panic, riots, and what not?
Pretty
scary, isn’t it?
Basically,
anything that is connected to the internet can be hacked with the right tools
and skills and IoT is no exception to that. A security firm ESET recently found
a malware named “KTN-Remastered” that would target routers and other embedded devices like IoT.
According
to Intel Security, IoT devices are just beginning to be exploited. It is only a
matter of time until IoT device threats become more widespread. Attackers are
not after the devices themselves, but the data or gateway capability that they
enable because it is the easiest way in, and these devices often provide
under-defended access to target-rich networks. (http://www.zdnet.com/article/iot-malware-and-ransomware-attacks-on-the-incline-intel-security/)
According
to Gartner, by 2020, more than half the major new business processes and
systems will incorporate some element of IoT leading to 20 billion IoT devices
connected over the internet. Gartner expects black market exceeding $5 billion
worth of IoT devices with fake censors for enabling criminal activity.
IoT
can be classified into two categories, sensors, and controllers. Sensors and
controllers are connected over the internet to collect the data, analyze and
regulate the process that they support.
Radicals
can get access to these sensors and controllers by using the internet as an
access medium and can become the controllers of these controllers – master
controllers. These master controllers can combine several technologies
like high-speed internet, augmented reality, artificial intelligence, wearable
technology, cloud computing, etc., together and get complete access to the
device that they’ve hacked into. For radicals, IoT based attack is the
easiest and cost-effective way of declaring war against any country they want.
Simply put, IoT is both a luxurious blessing and a dangerous weapon.
I
strongly feel that it is important for governments, policymakers, and
technology leaders to connect together and start working on security measures
in preventing IoT terrorism. They will also have to come up with a proper
contingency plan for every possible attack that could happen and should be
ready to face it “if it happens”. But how?
- Implement
security standards at the manufacturing level
- Strict
guidance’s to IoT manufacturers and enables the approval process for every IoT
device that is conceptualized
- Draft a IoT
security and implementation framework
- Draft Compliance
standards
- Both IoT service
provider and consumer must have a security policy and vulnerability policy
implemented with security patches released frequently to address concerns
- Identify
innovative and more secure ways to exchange encryption keys
- New security
protocols should be rolled out to manage IoT devices
- Every IoT cloud
must be SAS70 certified
- Governments
should implement new pattern analytical engines to understand and alert if
there is a change in IoT data delivery patterns.
Currently
there are initiatives like Builditsecure.ly or OWASP Internet of Things project that
could actually help to build a more robust and secure platform for connected-device with very minimal to no serious security issues.
I
want to conclude this article with a piece of text I came across:
If
we’re not careful, the Internet of Things could also turn out to be one of the
most dangerous weapons around. Subverted by malicious intent, the Internet of
Things could just as easily turn our lives into a horror movie, one in which
the everyday objects we depend on have suddenly developed a new urge—the urge
to destroy.
Great Information. Thank You Author, for sharing your valuable information about iot with us. People who are reading this blog can continue your knowledge which you gained with us and know how to apply this practically along with our IoT Training
ReplyDeleteGreat Article
ReplyDeleteInternet of Things Final Year Project
Final Year Project Centers in Chennai
Artificial intelligence (AI) is perhaps the most talked about Emerging Technology Development Company
ReplyDelete. While the idea of sentient robots taking over the world is a popular trope in science fiction, the reality of AI is far more nuanced.