Open main menu
Home
Random
Recent changes
Special pages
Community portal
Preferences
About Wikipedia
Disclaimers
Incubator escapee wiki
Search
User menu
Talk
Dark mode
Contributions
Create account
Log in
Editing
Computer security
(section)
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
===Internet of things and physical vulnerabilities=== The [[Internet of things]] (IoT) is the network of physical objects such as devices, vehicles, and buildings that are [[Embedded system|embedded]] with [[electronics]], [[software]], [[sensor]]s, and [[Internet access|network connectivity]] that enables them to collect and exchange data.<ref>{{cite web|url=http://www.itu.int/en/ITU-T/gsi/iot/Pages/default.aspx|title=Internet of Things Global Standards Initiative|work=ITU|access-date=26 June 2015|url-status=live|archive-url=https://web.archive.org/web/20150626125229/http://www.itu.int/en/ITU-T/gsi/iot/Pages/default.aspx|archive-date=26 June 2015}}</ref> Concerns have been raised that this is being developed without appropriate consideration of the security challenges involved.<ref>{{cite journal|last1=Singh|first1=Jatinder|last2=Pasquier|first2=Thomas|last3=Bacon|first3=Jean|last4=Ko|first4=Hajoon|last5=Eyers|first5=David|title=Twenty Cloud Security Considerations for Supporting the Internet of Things|journal=IEEE Internet of Things Journal|volume=3|issue=3|date=2015|pages=269β284|doi=10.1109/JIOT.2015.2460333|s2cid=4732406|url=https://dash.harvard.edu/bitstream/1/35349952/1/iot-2016.pdf|url-access=}}</ref><ref>{{cite news|url=https://www.forbes.com/sites/chrisclearfield/2013/09/18/why-the-ftc-cant-regulate-the-internet-of-things/|title=Why The FTC Can't Regulate The Internet Of Things|first=Chris|last=Clearfield|work=Forbes|access-date=26 June 2015|url-status=live|archive-url=https://web.archive.org/web/20150627090938/http://www.forbes.com/sites/chrisclearfield/2013/09/18/why-the-ftc-cant-regulate-the-internet-of-things/|archive-date=27 June 2015}}</ref> While the IoT creates opportunities for more direct integration of the physical world into computer-based systems,<ref>{{cite web | url=https://hbr.org/resources/pdfs/comm/verizon/18980_HBR_Verizon_IoT_Nov_14.pdf |archive-url=https://web.archive.org/web/20150317052909/https://hbr.org/resources/pdfs/comm/verizon/18980_HBR_Verizon_IoT_Nov_14.pdf |archive-date=2015-03-17 |url-status=live | title=Internet of Things: Science Fiction or Business Fact? | work=Harvard Business Review | access-date=4 November 2016}}</ref><ref>{{cite web | url=http://www.internet-of-things-research.eu/pdf/Converging_Technologies_for_Smart_Environments_and_Integrated_Ecosystems_IERC_Book_Open_Access_2013.pdf | title=Internet of Things: Converging Technologies for Smart Environments and Integrated Ecosystems | publisher=River Publishers | access-date=4 November 2016 | first1=Ovidiu | last1=Vermesan | first2=Peter | last2=Friess | url-status=live | archive-url=https://web.archive.org/web/20161012010519/http://www.internet-of-things-research.eu/pdf/Converging_Technologies_for_Smart_Environments_and_Integrated_Ecosystems_IERC_Book_Open_Access_2013.pdf | archive-date=12 October 2016 | df=dmy-all }}</ref> it also provides opportunities for misuse. In particular, as the Internet of Things spreads widely, cyberattacks are likely to become an increasingly physical (rather than simply virtual) threat.<ref>{{cite journal | last=Clearfield | first=Chris | title=Rethinking Security for the Internet of Things | journal=Harvard Business Review | date=2013-06-20 | url=http://blogs.hbr.org/2013/06/rethinking-security-for-the-in/ | archive-url=https://web.archive.org/web/20130920145534/http://blogs.hbr.org/2013/06/rethinking-security-for-the-in/ | archive-date=2013-09-20 | url-status=live }}</ref> If a front door's lock is connected to the Internet, and can be locked/unlocked from a phone, then a criminal could enter the home at the press of a button from a stolen or hacked phone. People could stand to lose much more than their credit card numbers in a world controlled by IoT-enabled devices. Thieves have also used electronic means to circumvent non-Internet-connected hotel door locks.<ref>{{cite web|url=https://arstechnica.com/security/2012/11/hotel-room-burglars-exploit-critical-flaw-in-electronic-door-locks/|title=Hotel room burglars exploit critical flaw in electronic door locks|work=Ars Technica|access-date=23 May 2016|url-status=live|archive-url=https://web.archive.org/web/20160514002208/http://arstechnica.com/security/2012/11/hotel-room-burglars-exploit-critical-flaw-in-electronic-door-locks/|archive-date=14 May 2016|date=26 November 2012}}</ref> An attack aimed at physical infrastructure or human lives is often called a cyber-kinetic attack. As IoT devices and appliances become more widespread, the prevalence and potential damage of cyber-kinetic attacks can increase substantially.
Edit summary
(Briefly describe your changes)
By publishing changes, you agree to the
Terms of Use
, and you irrevocably agree to release your contribution under the
CC BY-SA 4.0 License
and the
GFDL
. You agree that a hyperlink or URL is sufficient attribution under the Creative Commons license.
Cancel
Editing help
(opens in new window)