Page 40 - Security Today, May 2018
P. 40

Internet of Things
As IoT gains momentum among consumers, you need to now what the implications are for government security
kConnected or smart devices in or on buildings, vehicles, and even people include software, mobile apps, sensors, and network connectivity used to collect and exchange data. They are also all part of the Internet of Things (IoT). The point: to remotely monitor and manipulate these devices, as well as evaluate trends in their use.
IoT devices include medical equipment, such as heart monitor- ing implants and biochip transponders; wearables, such as the Apple Watch and FitBit; building automation, such as lighting and thermo- stats; vehicle infotainment and assistance systems, as well as driver- less vehicles; and appliances including ovens, refrigerators, washers and dryers.
When it comes to securing government facilities, operations, and personnel, IoT presents a considerable challenge, not just from
individuals who use it for everyday life and work, but also inter- nally, as more contractors and agencies implement it for business and facilities operations.
The Risks of IoT in Government Facilities
“Shadow IT” and rogue devices, whether connected to a network port or to a facility’s Wi-Fi, have been a risk for the better part of a generation. Many are designed to make work more convenient; some are intentionally malicious. To that end, most corporate secu- rity experts are familiar with unauthorized access points such as an employee’s device used as a personal wireless access point, or ad hoc peer-to-peer connections.
Finding them as part of a robust intrusion detection protocol is no longer as easy as performing a port scan or interrogating a router
GS10
GOVERNMENT SECURITY MAY 2018
By Christa Miller
Forensic Analysis and Security
a-image/Shutterstock.com


































































































   38   39   40   41   42