SlideShare a Scribd company logo
INTERNET OF THINGS POSES OPPORTUNITIES FOR CYBER-CRIME (Src: http://www.ic3.gov/)
The Internet of Things (IoT) refers to any object or device which connects to the Internet to automatically
send and/or receive data.
As more businesses and homeowners use web-connected devices to enhance company efficiency or
lifestyle conveniences, their connection to the Internet also increases the target space for malicious cyber
actors. Similar to other computing devices, like computers or Smartphones, IoT devices also pose security
risks to consumers. The companies and the general public to be aware of IoT vulnerabilities cybercriminals
could exploit, and offers some tips on mitigating those cyber threats.
WHAT ARE SOME IOT DEVICES?
 Automated devices which remotely or automatically adjust lighting or HVAC
 Security systems, such as security alarms or Wi-Fi cameras, including video monitors used in nursery
and daycare settings
 Medical devices, such as wireless heart monitors or insulin dispensers
 Thermostats
 Wearables, such as fitness devices
 Lighting modules which activate or deactivate lights
 Smart appliances, such as smart refrigerators and TVs
 Office equipment, such as printers
 Entertainment devices to control music or television from a mobile device
 Fuel monitoring systems
HOW DO IOT DEVICES CONNECT?
IoT devices connect through computer networks to exchange data with the operator, businesses,
manufacturers, and other connected devices, mainly without requiring human interaction.
WHAT ARE THE IOT RISKS?
Deficient security capabilities and difficulties for patching vulnerabilities in these devices, as well as a lack
of consumer security awareness, provide cyber actors with opportunities to exploit these devices. Criminals
can use these opportunities to remotely facilitate attacks on other systems, send malicious and spam e-
mails, steal personal information, or interfere with physical safety. The main IoT risks include:
 An exploitation of the Universal Plug and Play protocol (UPnP) to gain access to many IoT devices.
The UPnP describes the process when a device remotely connects and communicates on a network
automatically without authentication. UPnP is designed to self-configure when attached to an IP
address, making it vulnerable to exploitation. Cyber actors can change the configuration, and run
commands on the devices, potentially enabling the devices to harvest sensitive information or
conduct attacks against homes and businesses, or engage in digital eavesdropping;
 An exploitation of default passwords to send malicious and spam e-mails, or steal personally
identifiable or credit card information;
 Compromising the IoT device to cause physical harm;
 Overloading the devices to render the device inoperable;
 Interfering with business transactions.
WHAT AN IOT RISK MIGHT LOOK LIKE TO YOU?
Unsecured or weakly secured devices provide opportunities for cyber criminals to intrude upon private
networks and gain access to other devices and information attached to these networks. Devices with default
passwords or open Wi-Fi connections are an easy target for cyber actors to exploit.
Examples of such incidents:
 Cyber criminals can take advantage of security oversights or gaps in the configuration of closed
circuit television, such as security cameras used by private businesses or built-in cameras on baby
monitors used in homes and day care centers. Many devices have default passwords cyber actors
are aware of and others broadcast their location to the Internet. Systems not properly secured can
be located and breached by actors who wish to stream live feed on the Internet for anyone to see.
Any default passwords should be changed as soon as possible, and the wireless network should
have a strong password and firewall.
 Criminals can exploit unsecured wireless connections for
automated devices, such as security systems, garage
doors, thermostats, and lighting. The exploits
allow criminals to obtain administrative
privileges on the automated device.
Once the criminals have obtained the
owner’s privileges, the criminal can access
the home or business network and collect
personal information or remotely monitor
the owner’s habits and network traffic. If the
owner did not change the default password or
create a strong password, a cyber-criminal could
easily exploit these devices to open doors, turn off security
systems, record audio and video, and gain access to sensitive data.
 E-mail spam attacks are not only sent from laptops, desktop computers, or mobile devices.
Criminals are also using home-networking routers, connected multi-media centers, televisions, and
appliances with wireless network connections as vectors for malicious e-mail. Devices affected are
usually vulnerable because the factory default password is still in use or the wireless network is not
secured.
 Criminals can also gain access to unprotected devices used in home health care, such as those used
to collect and transmit personal monitoring data or time-dispense medicines. Once criminals have
breached such devices, they have access to any personal or medical information stored on the
devices and can possibly change the coding controlling the dispensing of medicines or health data
collection. These devices may be at risk if they are capable of long-range connectivity.
 Criminals can also attack business-critical devices connected to the Internet such as the monitoring
systems on gas pumps. Using this connection, the criminals could cause the pump to register
incorrect levels, creating either a false gas shortage or allowing a refueling vehicle to dangerously
overfill the tanks, creating a fire hazard, or interrupt the connection to the point of sale system
allowing fuel to be dispensed without registering a monetary transaction.
CONSUMER PROTECTION AND DEFENSE RECOMMENDATIONS
 Isolate IoT devices on their own protected networks;
 Disable UPnP on routers;
 Consider whether IoT devices are ideal for their intended purpose;
 Purchase IoT devices from manufacturers with a track record of providing secure devices;
 When available, update IoT devices with security patches;
 Consumers should be aware of the capabilities of the devices and appliances installed in their
homes and businesses. If a device comes with a default password or an open Wi-Fi connection,
consumers should change the password and only allow it operate on a home network with a
secured Wi-Fi router;
 Use current best practices when connecting IoT devices to wireless networks, and when connecting
remotely to an IoT device;
 Patients should be informed about the capabilities of any medical devices prescribed for at-home
use. If the device is capable of remote operation or transmission of data, it could be a target for a
malicious actor;
 Ensure all default passwords are changed to strong passwords. Do not use the default password
determined by the device manufacturer. Many default passwords can be easily located on the
Internet. Do not use common words and simple phrases or passwords containing easily obtainable
personal information, such as important dates or names of children or pets. If the device does not
allow the capability to change the access password, ensure the device providing wireless Internet
service has a strong password and uses strong encryption.
For more resource:
Slideshare : http://www.slideshare.net/Deepakniit14
Twitter : @D3pak
Web : www.d3pak.branded.me

More Related Content

PDF
Security in Internet of Things(IoT) Ecosystem
PPTX
Presentation on IOT SECURITY
PPTX
IoT security presented in Ada's List Conference
PPTX
Automatski - The Internet of Things - Security in IoT
PPT
IoT security (Internet of Things)
PPTX
Security issues and solutions : IoT
PPTX
Security challenges for internet of things
PDF
Maheen.Mehnaz 071618056
Security in Internet of Things(IoT) Ecosystem
Presentation on IOT SECURITY
IoT security presented in Ada's List Conference
Automatski - The Internet of Things - Security in IoT
IoT security (Internet of Things)
Security issues and solutions : IoT
Security challenges for internet of things
Maheen.Mehnaz 071618056

What's hot (20)

PDF
Internet of Things: Challenges and Issues
PPTX
Presentation on IOT (Internet Of Things)
PPT
Indian perspective of cyber security
PPTX
A survey in privacy and security in Internet of Things IOT
PPTX
Chapter 1
PDF
Internet of Things- Remote Desktop & Wireless Hibernation
PDF
Cyber Security - ICCT Colleges
PDF
Iot Security and Privacy at Scale
PDF
The Internet of Things – Good, Bad or Just Plain Ugly?
PPTX
Introduction to IoT Security
 
PPTX
Cyber Security
PPTX
Hacking and Hacktivism
PDF
Mark Horowitz - Stanford Engineering - Securing the Internet of Things
PPTX
Privacy and Security in the Internet of Things
PDF
Ryan Wilson - ryanwilson.com - IoT Security
PPTX
Introduction to IOT security
PDF
Security Architecture for Small Branch and IoT
PPTX
IoT Security Middleware: evaluating the threats and protecting against them
PPTX
CYBER Crime Cyber Security Cyber Law INDIA
PPTX
Trylogic- Cyber security by Vikalp Sharma- FDP Presentation July 9 2020
Internet of Things: Challenges and Issues
Presentation on IOT (Internet Of Things)
Indian perspective of cyber security
A survey in privacy and security in Internet of Things IOT
Chapter 1
Internet of Things- Remote Desktop & Wireless Hibernation
Cyber Security - ICCT Colleges
Iot Security and Privacy at Scale
The Internet of Things – Good, Bad or Just Plain Ugly?
Introduction to IoT Security
 
Cyber Security
Hacking and Hacktivism
Mark Horowitz - Stanford Engineering - Securing the Internet of Things
Privacy and Security in the Internet of Things
Ryan Wilson - ryanwilson.com - IoT Security
Introduction to IOT security
Security Architecture for Small Branch and IoT
IoT Security Middleware: evaluating the threats and protecting against them
CYBER Crime Cyber Security Cyber Law INDIA
Trylogic- Cyber security by Vikalp Sharma- FDP Presentation July 9 2020
Ad

Viewers also liked (17)

PPT
Information Security : A look
PPTX
ABORIGINAL AWARNESS DAY
PDF
DEPARTAMENTO FRENTE AL MAR EN VENTA EN PLAYA DEL CARMEN
PPTX
Comercio internacional
PPT
Do you 2.0 enough?
PDF
VILLA ENCANTADA
PDF
CVr Carola Agreda
PPTX
Europe VAT Risk & Prevention
PDF
Presidents design award winners
PDF
Your smartphone is your friend
PPT
Pecha kucha_Farhad Kaamel_IC1G
PDF
Pokemon 351 database
PPTX
J06001 PJ3 - Work Placement Presentation
PDF
Kickstart Your Amazon Selling Career
PDF
PPTX
Ransomware
PDF
Edward Snowden Data-Breach
Information Security : A look
ABORIGINAL AWARNESS DAY
DEPARTAMENTO FRENTE AL MAR EN VENTA EN PLAYA DEL CARMEN
Comercio internacional
Do you 2.0 enough?
VILLA ENCANTADA
CVr Carola Agreda
Europe VAT Risk & Prevention
Presidents design award winners
Your smartphone is your friend
Pecha kucha_Farhad Kaamel_IC1G
Pokemon 351 database
J06001 PJ3 - Work Placement Presentation
Kickstart Your Amazon Selling Career
Ransomware
Edward Snowden Data-Breach
Ad

Similar to IoT (20)

PDF
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
DOCX
Cyber Security and the Internet of ThingsVulnerabilities, T.docx
DOCX
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
DOCX
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
PPTX
IoT security
PPTX
Assign 1_8812814ctm.pptx
PDF
Io t whitepaper_5_15_17
PPTX
A Quick Guide On What Is IoT Security_.pptx
PDF
Protecting your home and office in the era of IoT
PPTX
Security aspect of IOT.pptx
PDF
IRJET - Cyber Security Threats and Measures in Context with IoT
DOCX
Final Research Project - Securing IoT Devices What are the Challe.docx
DOCX
Final Research Project - Securing IoT Devices What are the Challe.docx
PDF
Christopher Biedermann, EmiTel Ltd: Cybersecurity and the Internet of Things
PDF
LIFT OFF 2017: IoT and MSS Deep Dive
PPTX
itmsday2.pptx
PDF
12 IoT Cyber Security Threats to Avoid - CyberHive.pdf
DOCX
Written by Mark Stanislav and Tod Beardsley September 2015.docx
PPTX
IoT Security, Threats and Challenges By V.P.Prabhakaran
DOCX
Final Research Project - Securing IoT Devices What are the Challe.docx
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
Cyber Security and the Internet of ThingsVulnerabilities, T.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT security
Assign 1_8812814ctm.pptx
Io t whitepaper_5_15_17
A Quick Guide On What Is IoT Security_.pptx
Protecting your home and office in the era of IoT
Security aspect of IOT.pptx
IRJET - Cyber Security Threats and Measures in Context with IoT
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docx
Christopher Biedermann, EmiTel Ltd: Cybersecurity and the Internet of Things
LIFT OFF 2017: IoT and MSS Deep Dive
itmsday2.pptx
12 IoT Cyber Security Threats to Avoid - CyberHive.pdf
Written by Mark Stanislav and Tod Beardsley September 2015.docx
IoT Security, Threats and Challenges By V.P.Prabhakaran
Final Research Project - Securing IoT Devices What are the Challe.docx

More from Deepak Kumar (D3) (20)

PDF
Dark Web Forensics
PDF
Cyber Threat Intel : Overview
PDF
Cyber of things 2.0
PDF
Cyber Forensics
PDF
Threat Intelligence
PDF
Cyber Security Tips
PDF
CISSP INFORGRAPH MINDMAP
PDF
Cyber Forensics & Challenges
PDF
Cyber Crime Types & Tips
PDF
Cyber Security India & Cyber Crime
PDF
21st Century Cyber Forensics
PPTX
PDF
PDF
Ransomware
PDF
Success Mantra
PDF
Facebook Security Tips
PDF
Registry Registrar Registrant
PDF
Dark Web Forensics
Cyber Threat Intel : Overview
Cyber of things 2.0
Cyber Forensics
Threat Intelligence
Cyber Security Tips
CISSP INFORGRAPH MINDMAP
Cyber Forensics & Challenges
Cyber Crime Types & Tips
Cyber Security India & Cyber Crime
21st Century Cyber Forensics
Ransomware
Success Mantra
Facebook Security Tips
Registry Registrar Registrant

Recently uploaded (20)

PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PDF
Complications of Minimal Access Surgery at WLH
PDF
TR - Agricultural Crops Production NC III.pdf
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PPTX
Week 4 Term 3 Study Techniques revisited.pptx
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PPTX
The Healthy Child – Unit II | Child Health Nursing I | B.Sc Nursing 5th Semester
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PDF
Insiders guide to clinical Medicine.pdf
PDF
Microbial disease of the cardiovascular and lymphatic systems
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PPTX
Cell Types and Its function , kingdom of life
FourierSeries-QuestionsWithAnswers(Part-A).pdf
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
Complications of Minimal Access Surgery at WLH
TR - Agricultural Crops Production NC III.pdf
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
Module 4: Burden of Disease Tutorial Slides S2 2025
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
Supply Chain Operations Speaking Notes -ICLT Program
Week 4 Term 3 Study Techniques revisited.pptx
O5-L3 Freight Transport Ops (International) V1.pdf
Microbial diseases, their pathogenesis and prophylaxis
Abdominal Access Techniques with Prof. Dr. R K Mishra
human mycosis Human fungal infections are called human mycosis..pptx
2.FourierTransform-ShortQuestionswithAnswers.pdf
The Healthy Child – Unit II | Child Health Nursing I | B.Sc Nursing 5th Semester
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
Insiders guide to clinical Medicine.pdf
Microbial disease of the cardiovascular and lymphatic systems
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
Cell Types and Its function , kingdom of life

IoT

  • 1. INTERNET OF THINGS POSES OPPORTUNITIES FOR CYBER-CRIME (Src: http://www.ic3.gov/) The Internet of Things (IoT) refers to any object or device which connects to the Internet to automatically send and/or receive data. As more businesses and homeowners use web-connected devices to enhance company efficiency or lifestyle conveniences, their connection to the Internet also increases the target space for malicious cyber actors. Similar to other computing devices, like computers or Smartphones, IoT devices also pose security risks to consumers. The companies and the general public to be aware of IoT vulnerabilities cybercriminals could exploit, and offers some tips on mitigating those cyber threats. WHAT ARE SOME IOT DEVICES?  Automated devices which remotely or automatically adjust lighting or HVAC  Security systems, such as security alarms or Wi-Fi cameras, including video monitors used in nursery and daycare settings  Medical devices, such as wireless heart monitors or insulin dispensers  Thermostats  Wearables, such as fitness devices  Lighting modules which activate or deactivate lights  Smart appliances, such as smart refrigerators and TVs  Office equipment, such as printers  Entertainment devices to control music or television from a mobile device  Fuel monitoring systems
  • 2. HOW DO IOT DEVICES CONNECT? IoT devices connect through computer networks to exchange data with the operator, businesses, manufacturers, and other connected devices, mainly without requiring human interaction. WHAT ARE THE IOT RISKS? Deficient security capabilities and difficulties for patching vulnerabilities in these devices, as well as a lack of consumer security awareness, provide cyber actors with opportunities to exploit these devices. Criminals can use these opportunities to remotely facilitate attacks on other systems, send malicious and spam e- mails, steal personal information, or interfere with physical safety. The main IoT risks include:
  • 3.  An exploitation of the Universal Plug and Play protocol (UPnP) to gain access to many IoT devices. The UPnP describes the process when a device remotely connects and communicates on a network automatically without authentication. UPnP is designed to self-configure when attached to an IP address, making it vulnerable to exploitation. Cyber actors can change the configuration, and run commands on the devices, potentially enabling the devices to harvest sensitive information or conduct attacks against homes and businesses, or engage in digital eavesdropping;  An exploitation of default passwords to send malicious and spam e-mails, or steal personally identifiable or credit card information;  Compromising the IoT device to cause physical harm;  Overloading the devices to render the device inoperable;  Interfering with business transactions. WHAT AN IOT RISK MIGHT LOOK LIKE TO YOU? Unsecured or weakly secured devices provide opportunities for cyber criminals to intrude upon private networks and gain access to other devices and information attached to these networks. Devices with default passwords or open Wi-Fi connections are an easy target for cyber actors to exploit. Examples of such incidents:  Cyber criminals can take advantage of security oversights or gaps in the configuration of closed circuit television, such as security cameras used by private businesses or built-in cameras on baby monitors used in homes and day care centers. Many devices have default passwords cyber actors
  • 4. are aware of and others broadcast their location to the Internet. Systems not properly secured can be located and breached by actors who wish to stream live feed on the Internet for anyone to see. Any default passwords should be changed as soon as possible, and the wireless network should have a strong password and firewall.  Criminals can exploit unsecured wireless connections for automated devices, such as security systems, garage doors, thermostats, and lighting. The exploits allow criminals to obtain administrative privileges on the automated device. Once the criminals have obtained the owner’s privileges, the criminal can access the home or business network and collect personal information or remotely monitor the owner’s habits and network traffic. If the owner did not change the default password or create a strong password, a cyber-criminal could easily exploit these devices to open doors, turn off security systems, record audio and video, and gain access to sensitive data.  E-mail spam attacks are not only sent from laptops, desktop computers, or mobile devices. Criminals are also using home-networking routers, connected multi-media centers, televisions, and appliances with wireless network connections as vectors for malicious e-mail. Devices affected are usually vulnerable because the factory default password is still in use or the wireless network is not secured.  Criminals can also gain access to unprotected devices used in home health care, such as those used to collect and transmit personal monitoring data or time-dispense medicines. Once criminals have breached such devices, they have access to any personal or medical information stored on the devices and can possibly change the coding controlling the dispensing of medicines or health data collection. These devices may be at risk if they are capable of long-range connectivity.  Criminals can also attack business-critical devices connected to the Internet such as the monitoring systems on gas pumps. Using this connection, the criminals could cause the pump to register incorrect levels, creating either a false gas shortage or allowing a refueling vehicle to dangerously overfill the tanks, creating a fire hazard, or interrupt the connection to the point of sale system allowing fuel to be dispensed without registering a monetary transaction.
  • 5. CONSUMER PROTECTION AND DEFENSE RECOMMENDATIONS  Isolate IoT devices on their own protected networks;  Disable UPnP on routers;  Consider whether IoT devices are ideal for their intended purpose;  Purchase IoT devices from manufacturers with a track record of providing secure devices;  When available, update IoT devices with security patches;  Consumers should be aware of the capabilities of the devices and appliances installed in their homes and businesses. If a device comes with a default password or an open Wi-Fi connection, consumers should change the password and only allow it operate on a home network with a secured Wi-Fi router;  Use current best practices when connecting IoT devices to wireless networks, and when connecting remotely to an IoT device;  Patients should be informed about the capabilities of any medical devices prescribed for at-home use. If the device is capable of remote operation or transmission of data, it could be a target for a malicious actor;  Ensure all default passwords are changed to strong passwords. Do not use the default password determined by the device manufacturer. Many default passwords can be easily located on the Internet. Do not use common words and simple phrases or passwords containing easily obtainable personal information, such as important dates or names of children or pets. If the device does not allow the capability to change the access password, ensure the device providing wireless Internet service has a strong password and uses strong encryption. For more resource: Slideshare : http://www.slideshare.net/Deepakniit14 Twitter : @D3pak Web : www.d3pak.branded.me