Categories
Pages
-

IT Center Blog

IT-Security and the Internet of Things

February 11th, 2022 | by
Graphical representation of IoT

Source: Pixabay

The number of smart technologies seeing the light of day is growing steadily. Any everyday problem either gets its own smart solution or becomes at least supported by new technologies. The Internet is all around and supports us in every single aspect of our lives. By now, even our coffee machines are connected to our smartphone and ensures that our coffee is already waiting for us in the kitchen while we are still sitting at our desk. The so-called Internet of Things has countless advantages and is rightly referred to as the 4th Industrial Revolution. What exactly lies behind this term, what are the risks, and how can we avoid them?

What is the Internet of Things?

The term Internet of Things (IoT) refers to a network of smart devices. Each of these IoT devices functions as a computer and is networked with the other devices either locally or via the Internet.

The advantages of the Internet of Things

The main purpose of the IoT is to simplify our lives. The potential fields of application are almost infinite. For example, various household appliances and systems, can be connected and controlled, or can even work in a fully automatized way. Smart thermostats and lighting systems, voice assistants, air quality monitors and smart vehicles are just a small fraction of the many possible IoT applications. In medicine, wearables, i.e., devices that can be worn on the body, implants and smart-home technologies are capable of recording vital functions and even relaying them to a doctor in case of emergency. The Internet of Things also plays an enormous role in the industry. For example, manufacturing processes can be designed more efficiently thanks to IoT. Maintenance and repair of machines can also be carried out faster and more accurately. At this point, the Internet of Things has already become an essential part of nearly all aspects of our lives.

Which risks can the Internet of Things bear?

However, IoT does not only come with advantages. Every single connected device in a network always represents a potential target for attacks. Unfortunately, there is still a lack of adequate security solutions for many of these devices. In some cases, examined IoT devices showed security gaps and even forwarded personal data unencrypted, among other vulnerabilities. There are also physical security gaps that should not be underestimated. A very “illuminating” example of underestimated physical security gaps in the IoT was demonstrated by security consultant Michael Steigerwald during the Chaos Communication Congress 2018 (35C3). During his presentation, he demonstrated, among other things, how it was possible to read Wi-Fi access data as well as other data out of a smart light bulb.

How can I make sure my Internet of Things is safe?

First of all, it’s important to keep a close track of the devices you’re using and the data these devices are collecting. This also includes making sure that the software installed on the devices is always up to date. IoT devices that are not provided with updates pose a major security risk. The network in which the devices are connected with each other should also be adequately protected. A central firewall provides the essential basis for this. In addition, the network infrastructure, for example routers and switches, should also be secured with strong passwords. It is also advisable to set up a separate network for IoT devices and to prevent remote access from outside the home network to the maximum extent possible. Setting up and using a virtual private network (VPN) also offers the user significantly more security. Physical security should not be underestimated either. If possible, IoT devices should not be freely accessible.

More information on dealing with the Internet of Things in smart homes can be found on the website of the German Federal Office for Information Security (BSI). You can also find more articles on the general topic of IT security in our blog under the tag IT-Security.

 

Responsible for the content of this article is Stéphanie Bauens.

Comments are closed.