This article is available also in spanish here
IoT security solutions: How to prevent IoT attacks?
My list

Author | Jaime Ramos

The Internet of Things (IoT) or the digital interconnection of any device promises to change the history of technology in a major way. However, it is not all good news when we talk about developments such as these. As has always been the case with any information exchange method or system, there is a risk of it being intercepted.

It is what we now know as hacking, hijacking or piracy. Information network security attacks are becoming more frequent in the public sphere. Why do they happen?

IoT: What lies behind hacking?

iot-attacks-14

The security breaches that occur today tend to be essentially for financial gain. They involve hijacking data and demanding money to recover the data. These normally involve vast revenue for the affected companies.

However, there are also cases in more domestic spheres, in which the intention is to obtain users' personal data.

The hacker reaches the data through a device, which also serves as a gateway to the network. This enables them to control other devices, just as a virus can affect various organs once it enters the bloodstream.

According to the cybersecurity firm SAM Seamless Network, in 47% of domestic network attacks security cameras are the target. Followed by smart hubs, with 15% of the attacks and storage devices connected to the network, with 12%.

Real cases of IoT attacks

Among the most prominent attacks, is the one caused by the Mirai malware capable of DDoS attacks, i.e., it hijacks devices by obtaining access credentials and modifying them.

This is what Mirai did in October 2016, focusing on routers and IP cameras, with the added ability of, once infiltrated, being able to detect, like a chain reaction, other vulnerable devices that went on to be controlled. The digital attack lasted 77 hours, involving 24,000 devices and affecting media channels such as Twitter, CNN or Reddit.

Creativity in the attacks is unlimited and, in recent years, cases have been identified that were as serious as they were famous, for example, altering the water quality in a water treatment plant demonstrations of how to manipulate traffic lights or how to control a baby heart monitor. The aim of the latter was not to obtain information about the baby's heart rate or alarm parents with false figures, but to attack other domestic devices thanks to the vulnerability of the former.

Tips on how to protect IoT connected domestic networks

iot-attacks-15

The vulnerability of the devices covered by the Internet of Things depends to a large extent on the margin of protection granted by the supplier or manufacturer. Therefore, the first recommendation is to obtain information, before purchasing a product, about the product's real security against external attacks.

In the domestic arena, basic tips such as naming a router, establishing a local guest network for friends or family visits, changing default usernames and passwords, updating device software or disconnecting the characteristics of these that are not going to be used, can be highly effective.

In terms of industrial systems, such as those required to ensure that modern cities can operate with infrastructures based on data, the issue is more complicated. Not only technical protection measures are required, but also political measures, such as avoiding the use of external devices in secure areas and training employees to prevent the use of insecure storage devices such as a USB drive collected at the doors of an office (a method used to initiate an infection in a place that an attacker cannot get to by other means).

Before all of this, however, we need to understand why the security of the systems on which the Internet of Things is based is so important for the future of cities and why it needs to be guaranteed. There is still time to build solid defense mechanisms to prevent even more problems, the consequences of which may be hard to predict given the potential of IoT to influence our lives.

Images | iStock/Pheelings Media), iStock/Igor Kutyaev, iStock/gorodenkoff

Related content
What is an urban operating system?
What is an urban operating system?
IoT security solutions: How to prevent IoT attacks?
IoT security solutions: How to prevent IoT attacks?
The six most groundbreaking urban innovations of 2021
The six most groundbreaking urban innovations of 2021
Why Corporate Innovation Needs Transformation
Why Corporate Innovation Needs Transformation
What is the Internet of Things or IoT? Definition and examples
What is the Internet of Things or IoT? Definition and examples
Accelerating Cities' Digital Transformation with Technologies
Accelerating Cities' Digital Transformation with Technologies
What is digital infrastructure and examples of its application
What is digital infrastructure and examples of its application
Governing the twin transition: Transforming today’s challenges into future opportunities
Governing the twin transition: Transforming today’s challenges into future opportunities
AI & CITIES
AI & CITIES
Proprietary or open-source software? Arguments in favor and against
Proprietary or open-source software? Arguments in favor and against
What are the three main goals of database lifecycle management (DLM)?
What are the three main goals of database lifecycle management (DLM)?
Governments in digital transformation: five areas of action
Governments in digital transformation: five areas of action
What is a smart factory and how will it impact industry?
What is a smart factory and how will it impact industry?
How digitalization is transforming government in emerging economies
How digitalization is transforming government in emerging economies
Medical apps for patients: how can they improve public health?
Medical apps for patients: how can they improve public health?
Velodyne, NavVis and Qualcomm Technologies Working Together to Build Smart Cities Faster
Velodyne, NavVis and Qualcomm Technologies Working Together to Build Smart Cities Faster
In battle with U.S., China to focus on 7 ‘frontier’ technologies from chips to brain-computer fusion
In battle with U.S., China to focus on 7 ‘frontier’ technologies from chips to brain-computer fusion
Vintage technology: 'It sounds so much cleaner'
Vintage technology: 'It sounds so much cleaner'
Designers in Tech: How Architecture Is Unlocking the Potential of New Emerging Technologies
Designers in Tech: How Architecture Is Unlocking the Potential of New Emerging Technologies
Treat Smart City Tech like Sewers, or Better
Treat Smart City Tech like Sewers, or Better
Emerging technologies can foster an inclusive COVID-19 recovery
Emerging technologies can foster an inclusive COVID-19 recovery
Shopping with delivery robots arrives in cities
Shopping with delivery robots arrives in cities
Technology for smart cities: the pillars of urban planning of the future
Technology for smart cities: the pillars of urban planning of the future
Making Data Center Smart: How Artificial Intelligence Helps?
Making Data Center Smart: How Artificial Intelligence Helps?
Experts Say the ‘New Normal’ in 2025 Will Be Far More Tech-Driven, Presenting More Big Challenges
Experts Say the ‘New Normal’ in 2025 Will Be Far More Tech-Driven, Presenting More Big Challenges
Prof Shafi Ahmed: ‘Technology will completely transform healthcare’
Prof Shafi Ahmed: ‘Technology will completely transform healthcare’
Does the use of Big Data cause privacy concerns?
Does the use of Big Data cause privacy concerns?
Eye tracking technology: what is it and how will we see it in our cities
Eye tracking technology: what is it and how will we see it in our cities
Five top tips for businesses in 2021 from industry experts
Five top tips for businesses in 2021 from industry experts
Brief history of artificial intelligence
Brief history of artificial intelligence
China’s country-as-platform strategy for global influence
China’s country-as-platform strategy for global influence
As Robots Fill the Workplace, They Must Learn to Get Along
As Robots Fill the Workplace, They Must Learn to Get Along
Top 7 IoT Smart City Trends to Look Out In 2021
Top 7 IoT Smart City Trends to Look Out In 2021
“Liquid” machine-learning system adapts to changing conditions
“Liquid” machine-learning system adapts to changing conditions
Can Artificial Intelligence Replicate the Mystery of Human Conversation?
Can Artificial Intelligence Replicate the Mystery of Human Conversation?
China to become world's largest IoT market in 2024: report
China to become world's largest IoT market in 2024: report
The skills Deloitte looks for when it acquires IT service providers
The skills Deloitte looks for when it acquires IT service providers
Who needs a teacher? Artificial intelligence designs lesson plans for itself
Who needs a teacher? Artificial intelligence designs lesson plans for itself
4 Impactful Technologies From the Gartner Emerging Technologies and Trends Impact Radar for 2021
4 Impactful Technologies From the Gartner Emerging Technologies and Trends Impact Radar for 2021
Are Videogames the Future of Remote Work?
Are Videogames the Future of Remote Work?
China to become world's largest IoT market in 2024, says report
China to become world's largest IoT market in 2024, says report
Let interoperability be the foundation of smart cities
Let interoperability be the foundation of smart cities
Four emerging technology trends in 2021
Four emerging technology trends in 2021
Top 10 innovative regions in China
Top 10 innovative regions in China
What does Integration of Artificial Intelligence and Advanced Analytics mean in Business?
What does Integration of Artificial Intelligence and Advanced Analytics mean in Business?
Robots, wristbands, and apps: startups that innovated their products for COVID-induced med tech
Robots, wristbands, and apps: startups that innovated their products for COVID-induced med tech
Top 5 IoT programming languages in 2021
Top 5 IoT programming languages in 2021
How the pandemic will shape the workplace trends of 2021
How the pandemic will shape the workplace trends of 2021
How exactly are smart cities built? From facial recognition and 5G networks to cheap sensors — these are the essential components
How exactly are smart cities built? From facial recognition and 5G networks to cheap sensors — these are the essential components
Cyberplanning: Securing the IoT ecosystem
Cyberplanning: Securing the IoT ecosystem
Recommended profiles for you
Remember to activate your profile to network!
Activate profile
SS
Siddalinga Prasad S H
Leanovate info-solutions
CEO
SR
Saurabh Raj
Grroom
Machine Learning Intern
Yves Belliveau
Yves Belliveau
Embassy of Canada to Spain
Trade Commissioner
nc
niccolo corsani
UNIFI
STUDENT
LH
Lutz Heuser
[ui!] the urban institute
Founder & CEO
vs
victor solorzano
ExpendBox
CEO
JJ
JC JC
mediapro
Joerg  Molt
Joerg Molt
SatoshiCon - Satoshi Consulting & Education
Founder, Blockchain & Crypto Educator since 2010, Smart City Conceptualist, Speaker, Consultant
RC
Raúl Castellanos
ADIP
OPEN DATA
PF
Palmira Felgueiras
Municipio de Mirandela
-
RD
Rohin Daruwala
VJTI Mumbai
Professor and Dean
David Comas
David Comas
Nexus Geographics
Nexus Geographics is a leading company in geolocation, smart maps and smart routes
David  Crais
David Crais
CMG/Carealytics
Founder CEO
AM
Amit Mishra
techmishra
Own
EJ
Elisabeth Jorda
UPC - Barcelona Tech
Corporate Development Manager. Corporate Venturing&Innovation HUBs Manager.
AH
Arvie Rose Habay Habay
Society of Naval Architects and Marine Engineers/Naval Research and Technology Development Center
Research Engineer II
JF
José Manuel Francisco
Overon
Account Manager - Permanent Services
FC
Felipe Breno Coutinho Costa
UFBA
DPO
Kavan Weerasinghe
Kavan Weerasinghe
Richardson Technologies Pvt Ltd
Board of Ditectors
lr
limber rojas
ITC

Only accessible for registered users
This content is available only for registered users
TO: $$toName$$
SUBJECT: Message from $$fromName$$