Diese Präsentation wurde erfolgreich gemeldet.
Die SlideShare-Präsentation wird heruntergeladen. ×

Are You Safe in IOT? - Know About Different Types of Threats

Anzeige
Anzeige
Anzeige
Anzeige
Anzeige
Anzeige
Anzeige
Anzeige
Anzeige
Anzeige
Anzeige
Anzeige
Wird geladen in …3
×

Hier ansehen

1 von 28 Anzeige

Are You Safe in IOT? - Know About Different Types of Threats

Herunterladen, um offline zu lesen

2015 faces a big question — Internet of Things is providing you comfort and security or robbing it of you? People are not skeptical about the fact that Internet of Things is a multi trillion dollar business but they are oblivious that IoT at the same time is a potential disaster for privacy and security.

IoT’s immense influx of real-time data marks the beginning of new marketing, sales and customer service opportunities. And yes, I am not talking of the non-commercial personal aspects of IoT yet. I am talking in specifically about mobile app development.

With the change in information landscape due to the Internet of Things there has been a considerable change to the attack surface and threat environment of the Internet and connected systems. And it will definitely open a whole new scope of cyber attacks.

Internet of Things security is difficult to discuss as it is an immense concept and when you make everything IP-connected then how do you lock down security? And the span of “everything” stretches from your home appliances like refrigerator, music system, etc to your car and even to your office devices, office desk etc so the challenge is to take care of security on all these devices, all IoT enabled surfaces, walls, glasses, gadgets and everything. If IoT is connecting them all, so is it also connecting the risks to all these channels. Dangerous.

Capture…Disrupt…Manipulate !! You must be wondering why such derogatory terms out of the blue but rather you should be concerned which of your devices are subjected to any one or all of these RISKS!

Let us see the different types of threat one by one:

1. Capture Attack:

Systems composing the Internet of Things are very much susceptible to the various capture attacks which are done either to capture data or gain access to the devices. The data is omnipresent and thus providing the attacker greater access to gain physical or logical proximity to the targets.

2. Disrupt and Destroy Attack:

Apart from the capture attack there is also a high probability of the disrupt-and-destroy attacks. Unless they exist within the hardened environment they are subjected to physical abuse and tampering and if they are mobile devices they are also susceptible to displacement. However tampering of data is only feasible if the attacker has caught hold of a single or all the loopholes in that particular environment.

3. Manipulated Attack:

Manipulated attack is another grave situation in which the attacker intervenes with the decision cycle of the opponent. In certain cases they either capture and manipulate the embedded data in the systems and in some cases they may directly manipulate the sensors used for gathering the information. Sometimes the attacker also intervenes the communication channel transferring the data and exerts control over transmission of data as per their requirement.

2015 faces a big question — Internet of Things is providing you comfort and security or robbing it of you? People are not skeptical about the fact that Internet of Things is a multi trillion dollar business but they are oblivious that IoT at the same time is a potential disaster for privacy and security.

IoT’s immense influx of real-time data marks the beginning of new marketing, sales and customer service opportunities. And yes, I am not talking of the non-commercial personal aspects of IoT yet. I am talking in specifically about mobile app development.

With the change in information landscape due to the Internet of Things there has been a considerable change to the attack surface and threat environment of the Internet and connected systems. And it will definitely open a whole new scope of cyber attacks.

Internet of Things security is difficult to discuss as it is an immense concept and when you make everything IP-connected then how do you lock down security? And the span of “everything” stretches from your home appliances like refrigerator, music system, etc to your car and even to your office devices, office desk etc so the challenge is to take care of security on all these devices, all IoT enabled surfaces, walls, glasses, gadgets and everything. If IoT is connecting them all, so is it also connecting the risks to all these channels. Dangerous.

Capture…Disrupt…Manipulate !! You must be wondering why such derogatory terms out of the blue but rather you should be concerned which of your devices are subjected to any one or all of these RISKS!

Let us see the different types of threat one by one:

1. Capture Attack:

Systems composing the Internet of Things are very much susceptible to the various capture attacks which are done either to capture data or gain access to the devices. The data is omnipresent and thus providing the attacker greater access to gain physical or logical proximity to the targets.

2. Disrupt and Destroy Attack:

Apart from the capture attack there is also a high probability of the disrupt-and-destroy attacks. Unless they exist within the hardened environment they are subjected to physical abuse and tampering and if they are mobile devices they are also susceptible to displacement. However tampering of data is only feasible if the attacker has caught hold of a single or all the loopholes in that particular environment.

3. Manipulated Attack:

Manipulated attack is another grave situation in which the attacker intervenes with the decision cycle of the opponent. In certain cases they either capture and manipulate the embedded data in the systems and in some cases they may directly manipulate the sensors used for gathering the information. Sometimes the attacker also intervenes the communication channel transferring the data and exerts control over transmission of data as per their requirement.

Anzeige
Anzeige

Weitere Verwandte Inhalte

Diashows für Sie (20)

Anzeige

Ähnlich wie Are You Safe in IOT? - Know About Different Types of Threats (20)

Weitere von Ajeet Singh (20)

Anzeige

Aktuellste (20)

Are You Safe in IOT? - Know About Different Types of Threats

  1. 1. 2015 faces a big question when we talk about IoT flourishing…. that is…...
  2. 2. How much vulnerable are you with IoT ?
  3. 3. IoT is a multi trillion dollar business But…. A bitter truth
  4. 4. IoT at the same time is a potential disaster for privacy and security.
  5. 5. Data has immense value !! Some Facts
  6. 6. … so imagination of a world where all data can flow seamlessly introduced IoT
  7. 7. IoT… it will touch the mark of 50 billion connected devices by the year 2020.
  8. 8. IoT has changed the information landscape which has opened up a whole new scope of cyber attacks !!
  9. 9. IoT has IP-connected everything, so the question is how to lock down the security when everything is IP- connected !? A brain whacking question?
  10. 10. Hence it leads to …
  11. 11. Capture … Disrupt … Manipulate …
  12. 12. Capture Attack.
  13. 13. Internet of Things are very much susceptible to the various capture attacks which are done either to capture data or gain access to the devices.
  14. 14. Heterogeneity of devices is yet another reason to enhance the capture attack.
  15. 15. Successful capture of any system leads to subsequent capture of a number of related systems.
  16. 16. … chain of system data being exposed thereby disrupting the security of the entire environment. It leads to …..
  17. 17. Disrupt and Destroy Attack.
  18. 18. Capture Attack Destroy & Disrupt Attack leads to
  19. 19. It captures important data and tampers them accordingly and redirects the manipulated data. Tampering of data is only feasible if the attacker has caught hold of a single loophole in that environment.
  20. 20. Manipulate Attack.
  21. 21. Attacker intervenes with the decision cycle of the opponent.
  22. 22. They manipulate the sensors used for gathering the information. They capture and manipulate the embedded data in the systems. OR
  23. 23. Attacker intervenes with the communication channel transferring the data and exerting control over transmission.
  24. 24. Privacy Issues.
  25. 25. The connected objects populating the IoT are capable enough to transmit information about individuals i.e. about their state, location and can be used by the attacker to track you.
  26. 26. Change is inevitable and so are the security concerns. And security issues have been daunting us with every change in era but no matter what it has never been able to stop our technological revolutions. So are you safe in IoT? The wheels of development never stopped to roll due to such concerns instead the gravel laid roads were smoothened. So yes IoT is coming, brace yourselves.
  27. 27. Choose Algoworks For Better Decision Making For Your Business! Call us at: +1-877-284-1028 Mail us at: sales@algoworks.com support@algoworks.comAlgoworks Official Blog Link - https://medium.com/@algoworks/iot-risks-you-are-oblivious-about-e6140cbbe438

×