The Evolving Digital Monster
The internet is a dangerous place. It is a place where criminals steal identities, data, money, and even people. IoT technologies are creating unprecedented effects that will make things even worse as we see more convenience. The implementation of automated technologies is expected to boost the economy and improve life for citizens, particularly when combined with other related technology concepts, such as cloud computing, autonomy, and big data. However, the built-in vulnerabilities will challenge us to do better planning.
There are also factors that could prevent IoT from reaching its maximum potential benefits, including failure to manage the risk associated with rapid innovation and increased connectivity, the lack of an institutional support structure for the IoT, and the inability of governance and policy processes to keep pace with the rate of development and deployment of emerging IoT technology.
Cyber-security is Everyone’s Responsibility
This risk, coupled with the asymmetric nature of the cyber-security threat, requires an immediate and coordinated response from the public and private sector in order to ensure that the benefits of IoT are realized and the dangers are minimized.
The compromise or malfunction of IoT devices could have national security and emergency preparedness (NS/EP) implications as well. For this reason, we need to conduct an assessment to document IoT capabilities that currently support and/or planned for support of NS/EP functions. Assessments must consider interconnections and interdependencies that may be introduced and the associated risks and benefits. Next, we need to develop contingency plans to identify and manage security issues created by current and future IoT deployments within the Government. The plans should recognize that IoT devices and their potential uses will continually evolve.
Point of View
Very important to our understanding of IoT is having a balanced perspective between security, economic benefits, and potential risks. We need to establish metrics to measure and monitor the effectiveness of the technology we are using to enhance or ability or bring us value. We must also incorporate IoT technology in a manner that minimizes risk. The secret to security is in the architecture and the monitoring of our original assumptions. This is supplemented by incorporating IoT in security education and awareness programs. We need as many eyes on the use or misuse of technology as possible. Lastly, we must ensure IoT-related R&D projects are addressing evolving cyber-security challenges.
Several statistics validate the Government’s concerns that IoT is evolving with little oversight. For instance, the statistics tell a story. The number of Internet-connected devices first outnumbered the human population in 2008, and that number continues to grow faster than the human population. By 2013, there were as many as 13 billion Internet-connected devices, and projections indicate that this will grow to 50 billion or more by 2020, generating global revenues of greater than $8 trillion by 2020. Many of these systems are visible to any user, including malicious actors, as search engines are already crawling the Internet indexing and identifying connected devices.
As some of those devices like medical devices, including implantable ones, differ because an increasing number of them have built-in connectivity, we must stay vigilant. Proprietary critical devices are a recipe for disaster. It is possible that a compromised or malfunctioning IoT healthcare device could lead to patient deaths.
The Digital World as Connected Systems
The Internet Technologies (IT) and Operational Technologies (OT) are largely viewed as separate disciplines in the research and development community and in academia. However, critical infrastructure environments like transportation and electrical power generators will tell you different. To minimize potential risks, these gaps must be addressed. It cannot longer just be about selling a widget that performs a function. Buyers must demand a higher level of security from vendors. If they don’t, the idea of security living up to the requirements of this monster we are casually building will never evolve.
Pretty! This wasThis has been a reallyan extremelyan incredibly wonderful postarticle. Thank you forThanks forMany thanks for providingsupplying this informationthis infothese details.
Thank you!
It’s appropriate time to make some plans for the future and it is time to be happy. I have read this post and if I could I wish to suggest you some interesting things or suggestions. Perhaps you could write next articles referring to this article. I wish to read more things about it!
Hi Joline,
That is a great idea. Will do!
Thank you for the good writeup. It in fact was a amusement account it.Look advanced to far added agreeable from you!By the way, how could we communicate?
Vi jugar a Pirri, Breitner, Camacho en sus inicios, a Netzer, todavía tengo recuerdos de un Madrid Velencia en el que jugaba Kempes y en el que el Madrid le dio la vuelta a una liga igualadísima muy parecida a la que ha ganado este año, me hicieron Socio y a partir de ese momento no faltaba un Domingo a para ver al Madrid. Las comodidades incluyen frigorífico y sofá cama, además de un servicio de limpieza disponible todos los días.
Hola, Wealthy Affiliate es realmente un lugar increíble para aprender Marketing de Afiliados paso a paso desde cero de una manera muy detallada y fácil de usar. A la derecha del murciélago, tengo que decir que estoy muy impresionado por la cantidad de lecciones de alta calidad que he encontrado aquí en WA. Las lecciones en sí son super informativas y muy útiles, y hacen un trabajo fenomenal al explicar cada aspecto de manera detallada y útil para que todos lo entiendan. Pero lo que más me llamó la atención fue la comunidad de WA, que hace un trabajo excepcional en la prestación de ayuda en cualquier momento dado! Siempre se puede esperar obtener un gran apoyo y amor de la comunidad aquí en WA. Nunca he visto nada como esto antes en mi vida, ¡vaya! Gracias por tan detallada revisión, sigan con el buen trabajo 😉
También como se especifica en esta pagina nuestro servicio técnico de electrodomésticos hacen desplazamientos y en las comunidades Avila y Toledo Para los residentes en estas dos comunidades ponemos a su disposición una MAPA donde puede consultar de nuestro servicio técnico de reparación de electrodomésticos cubre la zona la localidad de su domicilio.
Más de 20 años nos avalan y miles de clientes de en toda la Comunidad de Madrid han depositado su confianza en nuestro servicio técnico que se desplaza de forma gratuita a cualquier casa, chalet residencia para efectuar una reparación para evitar un gasto mayor. Nuestro objetivo es que el cliente quede satisfecho con la reparación arreglo (de Frigoríficos, Lavadoras, Neveras, Lavavajillas, Campanas, Secadoras, Persianas) y satisfacer con la máxima garantía a los clientes. Nuestro Lema es el buen trabajo y seguimos día a día para lograr que nuestra asistencia técnica low cost sea la más usada en Madrid Comunidad de Madrid. Por si esto fuera poco, estamos cerca de su casa, en Madrid y comunidad autónoma.