Insights Success The 10 Best Performing CISCO Solution Providers in | Page 25

IoT Protection supported by their manufacturer, it creates a big security challenge. This is one of the IoT security challenges that the information security industry is well aware of. In such circumstance, an external, multilayer network security device can be of service so that you can continue to block attacks and keep the device functional. Even when updates are available, the user may opt out of applying an update. As part of your device management, you need to keep a track of the versions and which devices should be withdrawn after updates are no longer available. IoT Hardware As the IoT market grows and as hardware matures, we will see more investment and improved security. Several IoT devices have restricted amounts of storage, memory, and processing capabilities and are often operated on lower power. Security approaches that rely heavily on encryption are not a good fit for these constrained devices as they are not capable of performing complex encryption and decryption quickly to be able to transmit data securely in real-time. IoT systems should make use of multiple layers of defense, separating devices onto distinct networks and using firewalls, to compensate for the device limitations. Safe and Secure Communication In the initial days of internet, you probably worried about protecting your computers against viruses or malwares. If you were concerned about information you were sending online, you would use encryption on your emails. For most people, that was the extent of information security. Today, you have to not only be concerned about the data stored in the cloud, but also the physical devices and their communications. December|2017 Several IoT devices do not encrypt messages before sending them over the network. However, the best practice to use is transport encryption, and to adopt standards like Transport Layer Security. Using distinct networks to separate devices also help in establishing secure and private communications, so that transmitted data remains confidential. Detecting Vulnerabilities In spite of utilizing the best efforts, security vulnerabilities and breaches are unavoidable. Determining whether the IoT system has been compromised is not an easy feat. On a large scale IoT system, the complexity in terms of the number of devices connected and the variety of devices, apps, services, and communication protocols involved, can make it difficult to identify when a breach has occurred. Tactics for detecting susceptibilities and breaches include monitoring network communications and activity logs for irregularities, engaging in penetration testing and ethical hacking to expose vulnerabilities. Moreover, applying security intelligence and analytics can aid in identifying and notifying when incidents occur. signatures to ensure data has not been modified. Blockcha in, as a decentralized distributed ledger for IoT data, offers an accessible and robust approach for ensuring the integrity of IoT data. Authorize and Authenticate Devices Addition of multiple devices to the network offers potential points of failure with an IoT system thus, making authentication and authorization a vital criterion for securing IoT systems. Devices should be able to establish their identity before they can access gateways and upstream services. However there are many devices that fail in device authentication. Implementing an IoT platform that provides security by default will help in resolving these issues by enabling two factor authentications and enforcing the use of stronger passwords and certificates. IoT promises opportunity, but the security risks cannot be ignored whether it is from hackers or corporations. The best remedy is to consider the potential risks of installing connected devices and doing your research. Data Privacy and Integrity It is important to securely store and process data after it has been transmitted across the network. Implementing data privacy includes classification and disguising sensitive data before it is stored and using data separation to decouple identifiable information from IoT data payloads. Data that is no longer required should be disposed of securely and if stored, should be maintained with legal and regulatory compliance, which is also an important challenge. Ensuring data integrity, involves employing checksums or digital 23