Course Hero Logo

32 iot security justifying your customers trust

Course Hero uses AI to attempt to automatically extract content from documents to surface to you and others so you can study better, e.g., in search results, to enrich docs, and more. This preview shows page 31 - 33 out of 38 pages.

32IoT SecurityJustifying your customers' trust through securing their privacyThe Internet of Things (IoT) is a newparadigm that’s changing the world. It couldmake our world safer, improve our health,save us time and money, reduce waste andadd a new dimension to production controland life in general.Cybersecurity has traditionally beenassociated with the security of personal data.In the IoT era, however, this has transformedinto the security of privacy. Violations ofuser privacy such as remote surveillance viasmart home cameras, multimedia or babymonitors; interference in the functioning ofhousehold devices; unexpected shutdownsand the failure of everyday services – all ofthis is unacceptable to the end user.At the same time, the Internet of Thingsprovides tremendous opportunities fordevice manufacturers (including hardwarecomponents and software), telecom serviceproviders and the systems integrationmarket. A lack of trust in IoT solutions amongend-users could block or significantlyslow down realization of these potentialopportunities. That’s why end-to-endsecurity of IoT solutions is a top priority forall those involved.As things stand, IOT edge devices and telecoms equipment provided to customers caneasily incorporate cybersecurity violations. Hardware may fail to control the integrity ofthe firmware, and devices are sometimes shipped with preinstalled passwords, includingadministrator passwords. Weak network security settings or the use of old and vulnerablesoftware can also be issues. Add to that a lack of software update processes, meaning thatvulnerable devices can work for years without updates, and it’s clearly just a matter of timebefore the device is successfully attacked.The principle of a chain of trust forms the basis for guaranteeing the secure functioning ofan IoT device. Including edge devices and infrastructure elements (gateways). This principlebegins with the use of a root of trust at hardware level.Guarantees of trust at device level
33This technology carries out a trustedboot of an operating system, includingthe integrity of OS image checking,applying cryptography and mechanisms ofhardware-assisted secure storage for keyinformation. Trusted boot is crucial for keyIoT infrastructure devices such as gateways,ensuring the operating system is bootedfrom predefined media and only after theequipment has successfully passed specificintegrity checks.The next important element in the chain oftrust is a secure operating system capable ofensuring the proper execution of softwarethat is not considered to be trusted. Recentdevelopments in computer technology makeit possible to implement an environment atOS level that restricts the behavior of applica-tions that cannot be considered trusted.

Upload your study docs or become a

Course Hero member to access this document

Upload your study docs or become a

Course Hero member to access this document

End of preview. Want to read all 38 pages?

Upload your study docs or become a

Course Hero member to access this document

Term
Fall
Professor
kaspersky

Newly uploaded documents

Show More

Newly uploaded documents

Show More

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture