First Death by Internet

The quickly evolving Internet of Things or call it Internet of Everything will leave us more vulnerable to the cyber criminals. Government agencies are not prepared to combat the upcoming threat of “Online Murder”. Sounds Strange!!.. but we are heading towards this.

The upcoming IoT is an open source for the cyber criminals to exploit internet technology to target victims, the forensic techniques needs to address the danger posed by the cyber criminals.

"Internet of Everything" – a new era of technological interconnectedness in which everything from garage doors to hospital health systems will be linked and controlled through computer networks.  

We have already seen the case(s) where a software glitch that allows hackers commandeer a Jeep Cherokee while on the move is just a glimpse of dangers on the road ahead for the Internet of Things.

There are real and present dangers around the Internet of Things, take the case of the spamming refrigerator. Researchers proposed the smart fridge had been compromised to relay packs of annoying emails, as often happens to normal PCs. Yet Symantec exposed the fridge was simply on the same network and using the same IP address as a hacked Windows PC, which was really the thing responsible for the spam.

Yet there are reasons to be fearful of the Internet of Things (IoT), a name covering the networks of embedded devices, from smart meters to linked automobiles, which interconnect with each other in an robotic fashion to help make our lives more efficient.

Such connected, autonomous machines have been around for years, but the reason it is now on the tips of tech firms is that every day the number of connected devices is rapidly growing into new areas, like toothbrushes and bathtubs etc. According to Gartner estimates, the IoT will consist of 26 billion units by 2020, and by that time the industry will be worth $300 billion.

Need to Adopt Security by Design for IoT - The problem is that many of the manufacturers of these devices /machines are not taking the secure-by-design approach, they are learning on the job at this point in time.

Today developing products in the broad and fast-growing area of Internet-connected devices need to embrace security by design and adopt meaningful policies to limit data gathering and provide consumers with meaningful notice and choices about how their information is gathered, stored, processed, controlled, terminated.

Like the conventional way, that the common development approach in the tech industry -- pushing a product quickly out to market, then following up with patches and other updates -- might no longer apply in an IoT world, particularly when networked systems are appearing in people's homes and cars, where a digital security risk can quickly become a physical one.

If these measures of security can be adopted by organizations then companies can begin taking steps to position themselves for these changes by using the new technologies to optimize business processes in which traditional approaches have not brought satisfactory returns.

Energy consumption efficiency and process optimization are good early targets. Research with the emerging technologies should be steered in development labs and in small-scale pilot trials, and established businesses can join hands with innovative technology providers creating Internet-of-Things capabilities for target businesses.

E-mail me when people leave their comments –

You need to be a member of CISO Platform to add comments!

Join CISO Platform

CISO Platform

A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.

Join CISO Community Share Your Knowledge (Post A Blog)