Internet dating security
Large companies and industry organizations may have their own specific standards, while certain segments, such as industrial Io T, have proprietary, incompatible standards from industry leaders.
The variety of these standards makes it difficult to not only secure systems, but also ensure interoperability between them.
A number of attacks subsequently have made headlines, from refrigerators and TVs being used to send spam to hackers infiltrating baby monitors and talking to children.
It is important to note that many of the Io T hacks don't target the devices themselves, but rather use Io T devices as an entry point into the larger network.
Even if passwords are changed, they are often not strong enough to prevent infiltration.
Another common issue facing Io T devices is that they are often resource-constrained and do not contain the compute resources necessary to implement strong security.
The convergence of IT and operational technology (OT) networks has created a number of challenges for security teams, especially those tasked with protecting systems and ensuring end-to-end security in areas outside their realm of expertise.
A learning curve is involved, and IT teams with the proper skill sets should be put in charge of Io T security.
From a manufacturer's viewpoint, building security in from the start can be costly, slow down development and cause the device not to function as it should.
Each "thing" is provided a unique identifier and the ability to automatically transfer data over a network.
Allowing devices to connect to the internet opens them up to a number of serious vulnerabilities if they are not properly protected.
In 2010, for example, researchers revealed that the Stuxnet virus was used to physically damage Iranian centrifuges, with attacks starting in 2006 but the primary attack occurring in 2009.
Often considered one of the earliest examples of an Io T attack, Stuxnet targets supervisory control and data acquisition (SCADA) systems in industrial control systems (ICS), using malware to infect instructions sent by programmable logic controllers (PLCs).