Blogginlägg -

Explosion in IoT reveals risk of massive black market

In a recent report Gartner predicts that by 2020 over 50% of new major business process and system will incorporate some element of the Internet of Things. From a security perspective this growth will be challenge from many perspectives.

An interesting prediction in the analysis is that in 2020 Gartner expects that there will be a black market that exceeds $5 billion in value and that this is used to sell fake sensor and video data for enabling either criminal activities or to protect personal integrity. The criminal activities include activities such as;

  • getting access to sensitive information about an organization or individual
  • tampering and/or exchanging data to gain advantages such as getting access to premises

Personal integrity will also be a prime subject since the amount of data that is collected can be highly intrusive for an individual so individuals and organizations will seek methods to obfuscate location, behavior and state as they do not want to share this data uncontrolled which will be a disadvantage for commercial and public sector organizations who wants to provide services to the possessor of the data, a scenario that is a great disadvantage to the algorithm economy that brings a great promise to improve the world.

So providing methods to trust between IoT elements is key in terms of protection of the data as well as providing authenticity and origin of the data. Luckily there are already standards in place such as OAuth and UMA or in development in groups like ACE to provide a trusted scalable framework.

Gartner also predicts a rise in spending on security for IoT where it today is a 1% of the overall security budget it expected to be around 20% in 2020.

Full report can be found here for Gartner subscribers http://www.gartner.com/document/3174718?ref=solrAll&refval=160212104&qid=3e6f6b347b08de2e11eae1fbe07165e5

/Per Hägerö, Business Unit Director

Ämnen

  • Datasäkerhet

Regioner

  • Dalarna

Kontakter

Relaterat innehåll

  • neXus stärker i Mellanöstern

    neXus har ingått ett distributionsavtal med Shifra, en distributör i Dubai, vilket gör det möjligt för Shifra att sälja neXus PKI-plattformar i Mellanösternregionen.

  • Ale kommun stärker säkerhet för anställda

    Ale kommun har upphandlat en lösning för tillverkning och administration av tjänstekort som gäller för alla anställda. Kommunledningen ställde krav på att alla anställda skall ha en säker identifikation som också kan användas för säker inloggning samt för passage, print-on-demand etc.

  • neXus stärker satsning på Norden – rekryterar Marcus Persson från Atea

    neXus stärker nu ytterligare sin satsning på den nordiska marknaden och rekryterar Marcus Persson som ny regionchef för företaget i Norden. Marcus kommer närmast från Atea där han haft flera olika chefsroller och senast varit ansvarig för Ateas affärsavtal i Sverige.

  • Ny CFO till neXus

    Magnus Karlsson tillträder som CFO i Nexus den 22 februari 2016 och blir därmed ny medlem i koncernledningen. Magnus efterträder Björn Johansson som efter nio år i Nexus beslutat sig för att söka nya utmaningar utanför koncernen.

  • Identitetshantering för banker

    Den 12 februari 2016 publicerade den tyska finanstidningen gi geldinstitute en artikel om vikten av Identity Management, identitetshantering, för banker.

  • WebCrypto, Invisible Token and Hybrid Access Gateway

    After following the development of WebCrypto for more then three years it is awesome to see how it now slowly becomes implemented by the larger browsers. You can test your browser here.

  • The SCIM standards just grew up to become RFC's

    Integrity and simplicity for both users and IT-departments just took a huge step forward on the Internet. The SCIM specifications, System for Cross-Domain Identity Management, are now published as publications by the Internet Engineering Taskforce (IETF) as RFC7643 and RFC7644. At neXus we are super proud because we have been playing a key part of the specifications.

  • The Hacked Jeep is not alone

    As I wrote about in the blog post “Demystifying Security and Identities for Internet of Things” it is essential to implement security by design.

  • Identity data capture and validation is key

    This week I had the pleasure of visiting NORSIS event IDentitet 2016 in Oslo. Very well structured the event started with presentations around the capturing and validation of identity data which is fundamental for the trust in eIDs (and of course other types of credentials).

  • Happy Data Privacy Day!

    January 28th is the Data Privacy Day, a date that is currently observed in United States, Canada and 47 European countries.

  • Server Name Indication and Hybrid Access Gateway

    SNI is an extension to TLS that has been around for a while, since 2003, but is becoming more and more important as installations become multi tenant with customers from completely different organizations.