Intelligent CISO Issue 03 | Page 28

?

editor’ s question per the Federal Trade Commission global analysis, 10,000 IoT devices can generate 150 million discrete data points every day. This creates more entry points for hackers and leaves sensitive information vulnerable.
VISHAL BHAWNANI,
The proliferation of IoT has enabled the
PRACTICE HEAD – collection of big data. Smart sensors are gathering information for use in machine
CYBER SECURITY learning algorithms to add value to
ASSURANCE AT businesses and promote informed
PROVISE decision making.
SECURE LAB
Even if precautions are taken to secure data, the level of sophistication ntroducing IoT exhibited by cyberattackers is

I technologies remarkable. Attacks can be crafted within not just from public networks but organisations from private sources such as cars, is a benefit to smartphones and even smart homes. the information technology Complex IoT architecture domain. This growth carries several magnifies cyber-risks advantages as it will change the way technologists carry out everyday tasks By connecting a greater diversity of IoT and potentially transform the technology devices to networks, this brings with and cybersecurity landscape. it the associated risks. To put this into perspective, there are more than three But these advantages are weighted with billion smartphones currently in use some cybersecurity risks, as the increase globally and eight billion IoT devices. in IoT technologies motivates hackers The scale is substantial and it is only and cybercriminals to aim for entry points growing. As per Gartner, over 20 billion so that they can craft an attack for their IoT devices [ are likely ] to be connected lucrative gains. Potential cybersecurity through networks by 2020 which can be risks to get introduced within any hacked or compromised. organisation due to IoT technologies can be classified as follows:

Eavesdropping
Data theft and data privacy
The sheer amount of data that IoT devices can generate is staggering. As
Hackers could use a connected device to virtually invade a person’ s home or any smart devices. Researchers accomplished this by intercepting unencrypted data from a smart meter device to determine what television show someone was watching at that moment. Unauthorised physical access to smart devices; deliberate manipulation of an IoT operation. Other cybersecurity risks are:
• Theft of personally identifiable information from manufacturer or third-party storage systems
• Extortion enabled by ransomware that renders inoperable of IoT smart device until a ransom is paid. The risk of ransomware has so far affected ordinary individuals, hospitals and other institutions
• Hijacking IoT systems to enable malicious cyberactivity: if the systems are / would be used as command and control infrastructure for illicit cyberactivity
To conclude, the above-mentioned cybersecurity risks within organisations are due to introducing IoT technologies. However, these IoT technologies support modern organisations in balancing the cybersecurity risks by:
• Secret Handshake which will balance data theft and privacy cybersecurity risk
• Usability of pattern recognition that will balance or mitigate the risk of ransomware affecting the organisations
• Increase of cloud computing will lead as a frontier from technology aspects which balances the risk of hijacking and data security between systems / applications
• Complex IoT architecture will resolve the culture of remote connectivity to networks which should balance the risk of eavesdropping
28 Issue 03 | www. intelligentciso. com