What’s their Need?
Every connected device the enterprise or industry adds to the network for functionality or convenience, adds a concern from a privacy, confidentiality, or integrity angle. It can be an attractive target for people who want to make a profit off, of your valuable enterprise data.
The IoT devices can be broadly classified in 3 categories – a data processor, a data collector, or a data correlator.
The IoT devices can broadly cause attacks in the below categories.
- An Availability attack where the IoT device can affect the network availability and either bring it down partially or fully.
- An Integrity attack where the IoT device can manipulate data either corrupting it, encrypting it for the purpose of financial gain or disruption.
- A Confidentiality attack where the IoT device can be a backdoor letting a hacker into the network.
These attacks can harm the enterprise causing outage and/or direct or indirect loss of revenue and reputation.
Hence, with IoT taking a centre stage and machines surpassing the humans, the security landscape changes from endpoint security to Security of Things (SoT).