13.07.2015 Views

hp-security-research-cyber-risk-report-pdf-2-w-1408

hp-security-research-cyber-risk-report-pdf-2-w-1408

hp-security-research-cyber-risk-report-pdf-2-w-1408

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

HP Security Research | Cyber Risk Report 2015The Internet of ThingsWhile the “Internet of Things” (IoT) might just seem like one of the latest catc<strong>hp</strong>hrases, it is animportant paradigm in computing and communications that is likely to have profound effectsfor <strong>security</strong>. In the IoT, the objects we use in the physical world are identified, labeled, andinterconnected. While the technology for object connectivity has been around for some time,a confluence of additional factors has contributed to the current development of IoT, includingsignificantly cheaper storage, advances in Big Data processing, and connectivity chipsets. TheIoT enables these objects to not only communicate intelligently together, but also to monitor,measure, and act in response to changing environmental conditions, leading to greaterefficiencies in all manner of applications, from remote healthcare, to industrial systems, toavoiding having your fridge run out of milk. The IoT is where the physical world meets the virtualin practice.Understandably, the diverse and ubiquitous nature of the technology and devices thatcomprise the IoT gives rise to concerns regarding <strong>security</strong> and privacy in particular. Thecoming level of interconnectivity, combined with exponentially more data capture and storage,is unprecedented; in order for systems to respond appropriately to changing conditions,they must take accurate and ongoing measurements of their environment and the systemor endpoint they are monitoring (even if that endpoint is a person). What is thought to beappropriate access to and use of this data is yet to be determined, but there are multipledimensions that need to be considered. Also, as the IoT brings the physical and the virtual worldtogether, the consequences of unethical or malicious use become increasingly “real”—what ifan attacker hacked your car, or even your pacemaker?Figure 17. Evans Data Corporation global survey of developers, conducted in spring 2014 13317%Developers globally who areworking on applicationstargeting connected devices.23%Developers planning workon connected devices withinthe next six months.A spring 2014 Evans Data survey showed that 17 percent of developers globally were workingto develop applications targeting connected devices for the IoT and that 23 percent areplanning to do the same in the next six months or so. 134 Even though Internet-connecteddevices have existed for some time, it seems that the acquisition of Nest Labs, the connecteddevicescompany (and creator of the Nest learning thermostat), by Google for $3.2 billionmarked a turning point in the market, firmly focusing attention on IoT. 135 Several otherimportant acquisitions soon followed, such as SmartThings by Samsung 136 and Dropcam byGoogle, 137 showing that momentum is continuing to build in the IoT industry and that growth isaccelerating. (Our <strong>research</strong>ers spent some time in 2014 hacking a Samsung Smart IoT TV withsurprising results. Read the blog 138 for details.)133http://www.evansdata.com/press/viewRelease.p<strong>hp</strong>?<strong>report</strong>ID=38.134http://www.evansdata.com/press/viewRelease.p<strong>hp</strong>?pressID=212.135http://investor.google.com/releases/2014/0113.html.136http://www.samsung.com/us/news/23607.137http://www.reuters.com/article/2014/06/22/us-google-nest-dropcamidUSKBN0EW02820140622.138http://h30499.www3.<strong>hp</strong>.com/t5/HP-Security-Research-Blog/How-I-learned-to-hack-my-TV-and-started-worrying-about-the/bap/6383829.The explosive growth of IoT technologies is not accidental and is the result of the convergenceof several technologies, including broadband and Big Data processing and acquisition. Theburgeoning field of data collection and processing is tightly intertwined with that of IoT and thetwo areas otherwise fuel each other’s growth.The IoT normally implies interconnected hardware nodes. These hardware endpoints collectinformation about the environment and respond to the control functions of a user. These nodescould be part of a larger electrical device or could act as standalone units.46

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!