The 10 security myths of the Internet of Things are exposed

In the tech world, it is difficult for you to hear the word "Internet of Things" in the week. Advances in the Internet of Things have changed our lives and will continue to change as more and more devices are connected to the Internet of Things. The Internet of Things has had a huge impact on organizations and the general population, but what about the security of connecting IoT devices? Security is extremely important, but there are many myths about the security of the Internet of Things. Below you will find some myths about top Internet of Things security:

10. “Small IoT devices do not have the ability to achieve truly strong security.”

Even in the 1980s, only 2K, the primary 8-bit RAM chip can achieve elliptic curve encryption using a 256-bit key length, and effectively use RSA encryption with a 2048-bit key length, which is a US "secret" level national security information. It is strong enough. This kind of encryption uses the time signature or verification data every hour, and only uses a small battery such as an AA battery to run for more than twenty years.

The 10 security myths of the Internet of Things are exposed

9. "Security is too complicated, especially in the Internet of Things. You will never win."

Really effective security is by no means a single killer. On the contrary, just as wind-covered houses require several walls, roofs and floors, the security of an effective Internet of Things also requires some important factors:

· Good encryption protection authentication and potential protection of data confidentiality

• Encrypt and verify any and all code and configuration with the code allowed to run in any configuration.

· Secure third-party security operations to address any code vulnerabilities

Remote management capabilities, including update and software inventory management, security flexibility for telemetry and policy management

· Security analysis to identify and combat complex opponents

The combination of these important factors is simple and powerful enough to withstand the best attackers.

8. "Unable to update these devices."

Many devices are difficult to update, but almost none is impossible. Industrial systems have been deployed for an average of 19 years, and the same has been true for automotive and medical devices over the past few decades. Now, we see industrial equipment suppliers update their old equipment that has been used for less than a decade for the integrity of the equipment, and the medical equipment, ATMs, point-of-sale terminals, retail kiosks that people see now, Even the car is the same.

7. "The security cost is too expensive for the billions of devices deployed."

People think that the cost of scale and security is often only connected devices. Any connected device exceeds $20, which seems to be completely affordable, and the security risk is that the recklessness will endanger the business security of the enterprise, while preventing the risk of always changing. Some of the costs are a bit too expensive.

6. "We have airgaps, gateways and network isolation to protect us."

Almost all systems connect in ways that their creators may not know, but the attacker will find it quite creatively. This has been repeatedly proven in military, intelligence and critical infrastructure systems. Last year, a German steel mill blast was attacked, destroying a gateway designed to protect operational networks from attacks. Gateways help reduce risk, but not enough to provide adequate protection. Just as airgaps are not powerful, VLANs and other logical separations are more efficient. For high-value systems, it is necessary to strengthen internally, rather than relying on gateways, airgaps and network isolation.

5. "blockchain and PKI"

Blockchain is a record (and physical) object for record transactions and a large ledger system because they go through such ledgers. Unfortunately, most people forget the level of blockchains, their core stays at the traditional level of cryptographic operations, and with a lower base and traditional encryption operations, each transaction's signature library, key and certificate. For example, Bitcoin uses elliptic curve encryption and the strength of a 256-bit key, such as the IoT system that is often advocated for the same demand chain with the same style. Key management is a weakness of the cryptosystem. That's why IoT devices worth more than a billion dollars are already using the world's most sophisticated key management systems, certification authorities to provide management of public key infrastructure (PKI). A better PKI makes the blockchain classification more powerful. In other words, blockchain can make better use of PKI.

4. "We only need suppliers and standard teams to solve it faster"

Today, suppliers and standards bodies are making progress, but this process takes time. Unless the customer begins to ask about the type of safety they need, such as the “ingredients” mentioned above, the equipment supplier will continue to sell the equipment, neither safe nor more dangerous, and safety as an adjective rather than a true measure of the opponent's metrics.

3. "Running operational technology OPS team only needs to learn from it."

There is no good reason for the discussion of the operation of IT vendors and staff. Operating limitations are far different due to the IT environment and consequences, often with completely different time scales. Whether it is good or bad, many technologies on the OT side have been used in IT for many years. However, until IT vendors and staff understand their language and culture, other teams will not have any confidence in the technology that has been selected and suitable for their environment. IT security requires the OTOPS team to manage too many tools. Choosing the right tools and adjusting them appropriately requires collaboration between IT and OT.

2. "Our systems are so inconspicuous that no one can figure them out and cause damage."

Today, steel mills, sewage treatment plants, power grids, factories, power plants, and countless other systems have been hacked, and the naive beliefs of management and technicians have led to such results.

1. "I can do this alone."

History and recent headlines are filled with the stigma of companies trying to manage themselves. No company, no single supplier can beat all attackers alone. Defenders need to unite and hire professionals to ensure they have good partners in hardware, software and cloud computing, as well as related and specific vertical aspects.

Education Tablet

As a mobile multi-purpose platform, tablet computers also provide many possibilities for mobile teaching. The touch-based learning & entertainment teaching platform allows children to efficiently improve their academic performance in a relaxed and pleasant atmosphere. Such tablet computers generally integrate two learning sections of various courses and systematic learning functions. Generally, it includes multi-disciplinary high-quality teaching resources. The education tablet has the following main functions: it has the functions of touch screen input, text editing, picture editing, data storage, data management, wired and wireless Internet access that ordinary tablet computers have; Management functions, search methods support manual search, query by keyword, query by time; text and pictures can be scanned and converted into documents to save.

Education Tablet,learning tablet,leaning machine,New learning tablet

Jingjiang Gisen Technology Co.,Ltd , https://www.jsgisentec.com

Posted on