A security evolution driven by the Internet of Intelligent Things
Steve P. Williamson
Cyber Security: A Peer-Reviewed Journal, 2017, vol. 1, issue 1, 6-15
Abstract:
The technological evolution characterised by Social, Mobile, Analytics and Cloud (SMAC) brings transformational benefits for consumers at the expense of increased risk. The risk is not limited to data breach, initiated by cybercriminals. The Internet of Things (IoT) refers to devices with processing capability and internet connectivity. These things have a broad range of uses and may control hardware, such as industrial machinery, vehicles and medical devices. Malfunctions caused by software defects, malware attacks or misuse are potential causes of catastrophic events. This paper argues that information security controls, processes and capabilities need to evolve in order to address the risks that arise in this distributed digital landscape. Commonly accepted best practices, such as secure software development, privileged access control and security configurations are still critical mitigations. They are difficult to implement in the Internet of Things marketplace, however, which is characterised by rapid product development, limited regulation and uninformed consumers. In security terms, we need to defend a rapidly expanding attack surface against an increased range of threats. Loss of system availability or compromised data integrity could have catastrophic consequences for self-driving cars or in the dispensing of medication. When assessing risk, security systems provide necessary but insufficient mitigation. This paper will argue for a multidisciplined approach to risk management, requiring a greater convergence between the disciplines of both software quality and information security. This is especially necessary within the software development life cycle.
Keywords: IoT; AI; risk; secure development; safety; Internet of Things (search for similar items in EconPapers)
JEL-codes: M15 (search for similar items in EconPapers)
Date: 2017
References: Add references at CitEc
Citations:
Downloads: (external link)
https://hstalks.com/article/4421/download/ (application/pdf)
https://hstalks.com/article/4421/ (text/html)
Requires a paid subscription for full access.
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:aza:csj000:y:2017:v:1:i:1:p:6-15
Access Statistics for this article
More articles in Cyber Security: A Peer-Reviewed Journal from Henry Stewart Publications
Bibliographic data for series maintained by Henry Stewart Talks ().