Breaking News
Home / Students / Weaving security and privacy into the IoT fabric

Weaving security and privacy into the IoT fabric

In a world where everyone’s personal and financial information is available online, cyber security and privacy are very serious issues for consumers, corporations and governments alike. The rapid rise of wearables, smart meters, and connected homes and vehicles makes security and privacy more vital than ever. The cyber security is all about actively defending cyber-attacks in the only way to get ahead of cyber criminals and gain the trust of the customers. It is more than a technology issue and it cannot remain in the IT domain. It affects every level of a business and every part of the C- Suite in different often subtle and not easily recognized ways.

 

The complexity and heterogeneous nature of future networks and connected devices will require security and privacy controls to be made an intrinsic part of every device, network, cloud and application. However, controls are only valuable if they can be managed in a fast and coordinated manner across all layers – preferably in an automated fashion, steered by policies and analytical insights rather than by the choices of an individual. To weave security and privacy protection into every layer of ICT, we can take help of these three layers: actual security controls, security analytics, and an adaptive security posture.

 

Over the next decade, key security controls will include data sovereignty and novel identity management controls that are tailored for people and devices, as well as encryption technologies. Some encryption technologies are in the early phases of development but will begin to appear on the market in the next three to five years, as the underlying technologies mature.

 

Novel security analytics technologies provide insights to make it possible to create predictive security systems in opposition to reactive ones. These technologies could be used to create disruptive data management solutions soon, but for this to happen, we need to have context-aware security feeds and security analytics algorithms that correlate these feeds, often across multiple domains.

The adaptive security posture (Source: www.gartner.com)

 

The third technology layer, the adaptive security posture, is achieved through automation, based on security analytics insights and policy-based automated orchestration of security controls. It will all be built on trusted networks. No single industry player will be able to address these challenges on its own. Industry-wide collaboration, joint development, and standardization – including vendors, service providers, and users – will be essential to realize the vision of a secure Networked Society that protects business assets and everyone’s privacy. Traditionally, network service providers rank among the most trusted industry players. I believe that network service providers and their networks will be the foundation upon which the trust for everything else – devices, clouds, communications and applications – is built.

 

 

-Mona Roy (Marketing and Finance)

About Admin

Avatar

Check Also

Cyber Security- Facts, Scope and Job Opportunities

With the advent of technological advancements, there has been a continuous surge in data creation. ...

One comment

  1. Avatar

    A very good effort in terms of designing the title and content of the blog. I agree with you that security is the key concern of IoT and has a huge potential of improvement so as to build trust. Blockchain helps to build that trust with no 3rd party interference in any transaction but rather by only community based transactions. This concept is now laying grounds in different areas out of which IoT is one. ID theft is presently the major area of focus on IoT implementation.

Leave a Reply

Your email address will not be published. Required fields are marked *