Privacy and security challenges with Internet of Things in 2021 – A review

Data protection and security have been a major concern with respect to data in any form. The issues and challenges have been developing at a rapid pace. Even though quite of lot of issues have been addressed with growing technology, there still exists some challenges that are being encountered by the Internet of Things (IoT). Inadequate device upgrades, lack of robust and efficient security protocols, user ignorance, and notoriously active device monitoring are among the challenges it faces. Yesterday, I came across a post by Graham Cluley regarding the data a Samsung washing machine required in order to function properly. Technological advancements are demanding information like location, camera, phone calls and contacts. This goes on to show that data privacy has definitely gone for a toss. The Internet of Things (IoT) has grown in importance since the 1990s when it was first proposed as the idea of ​​networking various electronic devices through a variety of technologies. Over the past decade, however, the IoT has evolved rapidly without proper consideration of the profound security goals and challenges associated with it.

The IoT technology has brought incredible benefits to users; however, this comes with a number of challenges. Cybersecurity and data protection risks are the growing concerns as per current research and security specialists. These two factors pose a significant predicament for many organizations as well as for public organizations. This vulnerability is simply due to the fact that the networking of the networks in the Internet of Things arena enables continuous accessibility from an anonymous and unreliable Internet that requires novel security solutions. However, it is unfortunate that users often do not have the necessary recognition of security impacts until a breach occurs, resulting in massive damage such as the loss of important data. [Reference]

Source : Reference

A report by IDC, commissioned by Thales, shows that the urgency to implement new digital technologies often takes place without appropriate security measures. There are often weaknesses around the security of new IoT infrastructures and gaps in the protection of legacy systems that can get connected to open and vulnerable environment. In this case, a breach of an IoT device can even lead to unauthorized access to legacy systems. Some of the challenges that have highlighted below explain the various challenges w.r.t securing IoT. These include:

  1. Many devices in the Internet of Things are designed for deployment on a massive scale. An excellent example of this is sensors.
  2. Usually, the deployment of IoT comprises of a set of alike or nearly identical appliances that bear similar characteristics. This similarity amplifies the magnitude of any vulnerability in the security that may significantly affect many of them
  3. Similarly, many institutions have come up with guides for risk assessment conduction. This step means that the probable number of links interconnected between the IoT devices is unprecedented. It is also clear that many of these devices can establish connections and communicate with other devices automatically in an irregular way. [Reference]

The inter connectivity of IoT devices means that a device that is poorly secured and connected has the potential to compromise the security and resilience of the Internet internationally. This behavior is simply due to the challenge of widespread use of homogeneous IoT devices. The viewpoint of the usefulness of the IoT is reliant upon how well it can regard the privacy choices of individuals. Concerns in regards to the protection and the potential damages that show up with IoT might be huge in keeping down the full selection of IoT. It is crucial to realize that the rights of privacy and client protection are basic in guaranteeing clients’ certainty and self-assurance in the Internet of Things, the associated device, and related administrations advertised. Some of the other issues include occasional update, embedded password, automation, remote access and improper device authentication [Reference]

Presently, objects and frameworks are enabled with network availability and have the computing power to speak with comparable associated devices and machine. Extending the network capabilities to all conceivable actual areas will make our life more proficient and help us save time and money. In any case, associating with the Internet likewise intends to speak with potential cyber threats. Deploying encryption techniques: enforcing strong and updated encryption techniques can increase cybersecurity. The encryption protocol implemented in both the cloud and device environments could make a threat actor’s approach much complicated. Continuous checking of devices connected to the Internet of Things is one of the effective methods which will assist with saving the lives of numerous patients depending on technology. On-time alerts are very critical in the instances of life-threatening circumstances, as many medical IoT devices will continue to be connected to gather vital data for real-time tracking.

Article by Kaushik Sundararajan

I am a security professional specializing in network security. With vivid experience in different industries, I am looking to explore the current cyberspace and discuss the ideology of certain ideas from a different perspective.

Published by The Art of Cyber-Space

I am a security professional specializing in network security. With vivid experience in different industries, I am looking to explore the current cyberspace and discuss the ideology of certain ideas from a different perspective.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

%d bloggers like this: