IoT - striking that balance between security and convenience

IoT - striking that balance between security and convenience

While IoT has made everything smart, it has also opened up a Pandora’s box of security holes. Developers are finding it difficult in maintaining security while providing convenience to their device users.

The Internet of Things has evolved over time. Smart devices have become ubiquitous because IoT is making human life convenient. IoT devices have become an extension of our lives. In this process of accepting IoT, we have allowed reams and reams of data to be stored on our devices and on the cloud. If our devices get hacked, the security of our data and the privacy of our lives are at stake.

How IoT security is at stake

Here are 3 ways in which our data can be stolen:

Fingerprint scan

In the latest IoT devices, fingerprints are used to unlock the device, make financial transactions, etc. While this has made our lives comparatively convenient, it has also increased the threat of a hack, with fingerprints and vital personal data at risk.

 

Television sets

Today, we have television sets that use voice-control technology. In March 2017, Wikileaks ‘leaked’ that Samsung TVs were being used to spy on people. Even though this kind of hack has a limited reach (because for the hack to take place, the hacker has to connect the device to be hacked with a cable and only then can the television be hacked), it scared the daylights out of Samsung developers!

Google Home Mini

Google Home Mini is a voice-controlled speaker that assists its user to change music or call someone. Home Mini exhibited a flaw when it was supposedly recording a conversation of its users even when the button was not being pressed. The underlying pattern here is that since developers focus on making applications and devices more convenient for users, the security and privacy of users is highly at stake. Security and convenience are considered to be opposite objectives for tech companies. Thus, improving security while maintaining convenience is always tricky.

How security breach has changed hands

Initially, if someone wanted to attack an organization, they would have to physically travel to that place or attack its network. With the invention of IoT, attacking the infrastructure has become comparatively easier. If an attacker gets access to an IoT device, its connectivity to other devices on the network serve as a hackable entry point for hackers to penetrate and affect the entire system.

How convenience can be maintained by improving IoT security

Tech companies will play a crucial role in trying to improve the security of devices while trying to maintain convenience of their users. Here are 2 ways IoT developers can make sure that IoT security is maintained while trying to improve user convenience:

  1. Companies should give proper notifications to users about data that their application will save on their databases, even while the application is running in background. With the help of prior knowledge of what data will be used, the user can choose whether to use the application or not.
  2. Hiring third-party applications could be a tricky task for companies. Since voice-controlled transmissions are done by third party applications, trusting them with the data of your users is risky. Companies have to evaluate these risks before hiring third-party companies.

While IoT tries to balance between security and convenience, like any other technology, it will be a balanced approach that will pan out in the future. Compliances will enforce security measures while consumer behaviour will direct an optimum convenience in application features.    

Laura Parra

SAP FI Consultant

6 年

Great article!!! IoT is bring to us a lot of new opportunities, however we must also focus in cons, given that we will be me more vulnerable also.

Sander van der Snoek

Global Director of Cybersecurity

6 年

Nice article, i took the liberty of sharing it on my account. Thanks

回复
VANI P

Student at HKBK College of Engineering

7 年

Thank u for sharing such a useful information with us

回复
Prakash Bhatia

Specialist Education Professional

7 年

Thank you for this wonderful article Naveen!. The evolution of new technologies must be planned first with Security in mind for the user before being marketed commercially.

回复
Jonathan Marcelo

Sales Professional | Team Leader | Energy, Mining & Chemicals ??

7 年

Security at both the device and network levels is fundamental to IoT operation. The same intelligence that allows devices to perform their tasks must enable them to recognize and coun-teract threats too.

回复

要查看或添加评论,请登录

社区洞察

其他会员也浏览了