{"id":4332,"date":"2021-01-25T06:35:03","date_gmt":"2021-01-25T06:35:03","guid":{"rendered":"https:\/\/www.aiproblog.com\/index.php\/2021\/01\/25\/how-connected-data-and-iot-has-transformed-risk-management\/"},"modified":"2021-01-25T06:35:03","modified_gmt":"2021-01-25T06:35:03","slug":"how-connected-data-and-iot-has-transformed-risk-management","status":"publish","type":"post","link":"https:\/\/www.aiproblog.com\/index.php\/2021\/01\/25\/how-connected-data-and-iot-has-transformed-risk-management\/","title":{"rendered":"How Connected Data and IoT Has Transformed Risk Management"},"content":{"rendered":"<p>Author: Katherine Rundell<\/p>\n<div>\n<p><a href=\"https:\/\/storage.ning.com\/topology\/rest\/1.0\/file\/get\/8473845897?profile=original\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"https:\/\/storage.ning.com\/topology\/rest\/1.0\/file\/get\/8473845897?profile=RESIZE_710x\" width=\"620\" class=\"align-full\"><\/a><\/p>\n<\/p>\n<p>As the Internet of Things \u2013 or IoTs \u2013 grow more popular, and garner more users than in recent years, there\u2019s now a call for better cybersecurity when it comes to such technology. But to secure data in IoTs require an effective cybersecurity framework. <br \/> But before we would for certain what needs to be done to secure the data in IoT devices, we must first understand the risks, and how they can be detrimental to these devices.<\/p>\n<p><strong>Security Risks Of Using IoTs<\/strong><br \/> \u201cHumans may have the ability to turn computers on and off, but there are other things that are beyond their control,\u201d says Amber Cortez, a risk management blogger at <a href=\"https:\/\/stateofwriting.com\/hnd-writing-service-uk\" target=\"_blank\" rel=\"noopener\">State Of Writing<\/a> and <a href=\"https:\/\/boomessays.com\/essay-writer\" target=\"_blank\" rel=\"noopener\">Boomessays<\/a>. \u201cEven as we expect IoTs to help automate activities so that we can get to more important things, our data can still be at risk.\u201d<\/p>\n<p><strong>Bluetooth Connections<\/strong><br \/> Bluetooth connections are radio wave signals that are short-distance and low in frequency. Bluetooth connects devices to one another, usually within 30 feet. However, this connection isn\u2019t always network-enabled.<\/p>\n<p><strong>Common Risks Of IoTs<\/strong><br \/> Since Bluetooth and IoTs connect in more ways than one, they also risk being victims of cyberattacks. Here are 5 of the too-often security risks that IoTs pose:<\/p>\n<p><em>Authentication<\/em><br \/> When connecting to a network-based service, it\u2019s usually a username and password that you would enter. Or, you would include multi-factor authentication to make it difficult for cyber criminals to access your device. <br \/> White Paper suggests that you enable <a href=\"https:\/\/info.hidglobal.com\/IA-WP-StrongAuthenticationtoPreventDataBreaches_LP-Request.html?ls=PPC&amp;utm_detail=2018-02-IA-WP-Strong-Authentication-to-Prevent-Data-Breaches-IA-NAM-EN-321&amp;gclid=EAIaIQobChMIpfX08Nj-7QIV5vvjBx2VhgcNEAAYASAAEgLDafD_BwE\" target=\"_blank\" rel=\"noopener\">IoT multi-factor authentication options<\/a> such as:<\/p>\n<ul>\n<li>Smartcards, or a Code-generating device<\/li>\n<li>Pin numbers, or another password<\/li>\n<li>Biometrics (i.e. fingerprint)<\/li>\n<\/ul>\n<p> Bluetooth connections lack this ability to authenticate your identity.<\/p>\n<p><em>Confidentiality<\/em><br \/> Since the connection between IoT devices aren\u2019t as secured as they should be, it\u2019s easy for information to get intercepted, even when the user is using \u201cpublic Wi-Fi.\u201d According to IntechOpen, there have been methods tried to limit the unnecessary <a href=\"https:\/\/www.intechopen.com\/books\/recent-trends-in-communication-networks\/confidentiality-and-integrity-for-iot-mobile-networks\" target=\"_blank\" rel=\"noopener\">disclosure of users&#8217; information on IoTs<\/a>: access control and cryptography. However, those are only temporary solutions to an ever-evolving problem in IoTs.<\/p>\n<p><em>Authorization<\/em><br \/> Bluetooth isn\u2019t capable of protecting IoTs from unauthorized users and programs. Amazon Web Services (AWS) defines authorization as \u201cthe process of granting permissions to an authenticated identity,\u201d which can determine who and what programs\/apps can <a href=\"https:\/\/docs.aws.amazon.com\/iot\/latest\/developerguide\/iot-authorization.html\" target=\"_blank\" rel=\"noopener\">access an IoT<\/a>. But again, without authorization, IoTs are open for \u201cunauthorized\u201d users and or programs\/apps to access an IoT.<\/p>\n<p><em>Integrity<\/em><br \/> With over 20.8 billion <a href=\"https:\/\/www.electronicspecifier.com\/industries\/wireless\/ensuring-data-integrity-in-the-internet-of-things\" target=\"_blank\" rel=\"noopener\">IoT users<\/a> expected in 2020 (and counting), according to technology industry researcher Gartner, data integrity is expected in all IoT devices. But since you can\u2019t authenticate users or set authorizations, virtually anyone can get into an IoT device and potentially do harm.<\/p>\n<p><em>Pairing<\/em><br \/> Pairing can also be an issue for Bluetooth IoTs device, since it requires you to establish an information sharing connection between device, allowing other Bluetooth users to see your connection and join without your consent. ACM Digital Library suggest that it\u2019s because of IoTs\u2019 \u201clack of conventional user interfaces\u201d \u2013 keyboards and displays \u2013 that \u201c[make] many traditional <a href=\"https:\/\/dl.acm.org\/doi\/abs\/10.1145\/3372297.3417286\" target=\"_blank\" rel=\"noopener\">IoT pairing approaches<\/a> inapplicable.\u201d<\/p>\n<\/p>\n<p><strong>Why Risk Management Means Continual Assessment<\/strong><br \/> As you can see, it\u2019s not enough to leave IoTs in automation. In fact, IoTs need to have regular risk assessments, even if you don\u2019t feel that they need it. And, since risks evolve over time, especially from the following activities:<\/p>\n<ul>\n<li>Users adding and removing devices<\/li>\n<li>Changes to access policies<\/li>\n<li>New vulnerabilities being discovered, AND<\/li>\n<li>Firmware and software updates on IoT devices.<\/li>\n<\/ul>\n<p><strong>Who Accesses IoTs?<\/strong><br \/> \u201cIt\u2019s important to see who is accesses to and from your devices, so that you can ensure the overall operational integrity of your connected environment,\u201d says Phillip Manning, an IOT expert at <a href=\"https:\/\/paperfellows.com\/\" target=\"_blank\" rel=\"noopener\">Paper Fellows<\/a> and <a href=\"https:\/\/essayroo.com\/do-my-assignment\" target=\"_blank\" rel=\"noopener\">Do My Assignment<\/a>. \u201cFor instances, a business should be able to authenticate its users to ensure a more secure place for them, and as a means to keep their information safe from prying eyes.\u201d<\/p>\n<p><strong>Get Ahead With Analytics<\/strong><br \/> While IoT deployments tend to make security risks worse, this scale DOES have one advantage: abundant operational data about the devices, of which security teams can apply the analytics and AI techniques to:<\/p>\n<ul>\n<li>Examine devices<\/li>\n<li>Keep track of device status, AND<\/li>\n<li>Detect compromised devices<\/li>\n<\/ul>\n<p><strong>Conclusion<\/strong><br \/> So, as IoTs continue to be used by billions of users worldwide, there\u2019s still the need to ensure high-quality cybersecurity for such devices. As you saw in this guide, IoTs still have a long way to go to prevent the risks from happening in the future.<\/p>\n<p><em>Katherine Rundell is a writer and editor at <a href=\"https:\/\/academized.com\/writing-services\/write-my-personal-statement\" target=\"_blank\" rel=\"noopener\">Personal Statement<\/a> and <a href=\"https:\/\/ukwritings.com\/law-essay-help\" target=\"_blank\" rel=\"noopener\">Law Essay Help<\/a>. She writes about risk management. Also, she is a tutor at <a href=\"https:\/\/oxessays.com\/services\/essay-writing\" target=\"_blank\" rel=\"noopener\">Essay Writing Service<\/a>.<\/em><\/p>\n<\/div>\n<p><a href=\"https:\/\/www.datasciencecentral.com\/xn\/detail\/6448529:BlogPost:1008931\">Go to Source<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Author: Katherine Rundell As the Internet of Things \u2013 or IoTs \u2013 grow more popular, and garner more users than in recent years, there\u2019s now [&hellip;] <span class=\"read-more-link\"><a class=\"read-more\" href=\"https:\/\/www.aiproblog.com\/index.php\/2021\/01\/25\/how-connected-data-and-iot-has-transformed-risk-management\/\">Read More<\/a><\/span><\/p>\n","protected":false},"author":1,"featured_media":459,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_bbp_topic_count":0,"_bbp_reply_count":0,"_bbp_total_topic_count":0,"_bbp_total_reply_count":0,"_bbp_voice_count":0,"_bbp_anonymous_reply_count":0,"_bbp_topic_count_hidden":0,"_bbp_reply_count_hidden":0,"_bbp_forum_subforum_count":0,"footnotes":""},"categories":[26],"tags":[],"_links":{"self":[{"href":"https:\/\/www.aiproblog.com\/index.php\/wp-json\/wp\/v2\/posts\/4332"}],"collection":[{"href":"https:\/\/www.aiproblog.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.aiproblog.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.aiproblog.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.aiproblog.com\/index.php\/wp-json\/wp\/v2\/comments?post=4332"}],"version-history":[{"count":0,"href":"https:\/\/www.aiproblog.com\/index.php\/wp-json\/wp\/v2\/posts\/4332\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.aiproblog.com\/index.php\/wp-json\/wp\/v2\/media\/467"}],"wp:attachment":[{"href":"https:\/\/www.aiproblog.com\/index.php\/wp-json\/wp\/v2\/media?parent=4332"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.aiproblog.com\/index.php\/wp-json\/wp\/v2\/categories?post=4332"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.aiproblog.com\/index.php\/wp-json\/wp\/v2\/tags?post=4332"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}