The Global Standards Initiative on Internet of Things (IoT-GSI) defined the IoT as “the infrastructure of the information society.”
The IoT is a giant network of connected things (ecosystem).
The vision for IoT is that millions (and potentially billions) of devices will be connected to each other and the Internet allowing people to communicate with machines, and machines to communicate with other machines.
“Things,” in the IoT sense, can refer to a wide variety of IP-enabled devices and various devices such as cellphones, heart monitoring implants, biochip transponders, automobiles with built-in sensors, home monitoring devices, coffee machines, lamps, Amazon Eco, etc.
Analysts estimate that 20+ Billion devices will get connected to the Internet by 2020
IoT creates a large digital presence connecting organizations, cities and countries. Security decision makers must embrace fundamental principles of risk and resilience to drive change. With billions of devices connecting together in today’s digital environment, what can people and organizations do to make sure that their information’s stays secure. Will someone be able to hack into your toaster and thereby gain access to your entire network. The first step is to educate ourselves about what the IoT is and the impact on how we work and live with these devices. Second step include changing the default password on such devices if possible. Third, apply security and firmware updates.
The October 21, 2016 attack on online infrastructure provider Dyn was launched at least in part by Mirai, an open-source malware strain that scans the Internet for routers, cameras, digital video recorders and other Internet of Things “IoT” devices protected only by the factory-default passwords. Once infected with Mirai, the IoT systems can be used to flood a target with so much junk Web traffic that the target site can no longer accommodate legitimate users or visitors traffic, which resulted in a series of distributed denial-of-service (DDoS) attacks.
The Mirai botnet attack took down parts of Twitter’s network, as well as hundreds of other sites—including GitHub, Box, The Verge, PlayStation Network, and personal webpage provider Wix. Level 3 Threat Research Labs has been continuously tracking these botnets as they wreak havoc on victims across the internet.
This article was written by Osei Owusu, Technical Consultant for Tridea Partners. Tridea is a leading Microsoft Dynamics provider. www.trideapartners.com