How safe are IoT Devices?

For as long as computers have been around, people have been trying to hack into them, and for as long as hackers have been around there have been people trying to prevent this. Nowadays almost every operating system comes with some kind of default security, such as Windows Defender, there are also many paid alternatives but all with a common goal to keep your system and information safe.

But what about IoT (Internet of Things) devices? This is going to be the focus of my research project, as I have heard there are concerns with the security of some of these products. To find out more I am going to be researching the questions below to get a better understanding of the issue.

 

  1. Is there a growing number of attacks on IoT devices?

 

 

  1. How many households have IoT devices?

 

 

  1. Is there a way to easily protect these devices?

Class Notes week 12

1.Identify the problem 

“Figure out what you are trying to do and why you are doing it, who are you doing it for and whether it is worth doing and what you  intended to achieve”.

  • What have other done
  • Content
  • Difficulty

Result= Description of problem

2. Design a solution 

 Use all of the above to identify any other solutions, or closely related solutions that exist; figure out what combination of technology or technological approaches will bring the most value to your solution; bring all the knowledge you have gained so far into designing your new solution.”

  • Other solutions
  • Technical details

Result=Design

3. Build the solution 

“Create the new solution to a stage where it can be demonstrated to either the target audience or a proxy.”

4. Evaluate the solution 

“Identify effective ways of evaluating the solution; undertake and formally record the evaluation; identify the impact of the evaluation on the problem, the design and the implemented solution.”

5.Report

“record all important activities from the previous steps, including previous work, new thinking, decisions made, mistakes made and problems solved. Make this record accessible in various forms as appropriate (e.g. written report, poster presentation, website or blog.)”

6.Repeat

Similar principal to System Development Life Cycle (SDLC).

Reference

Atkins, C. (2014) Framing IT Capstone Development Projects with Design Science Research Principles. Proc of CITRENZ14, Auckland, New Zealand, October 8-10, 2014. Mike Lopez and Michael Verhaart, (Eds).


 

Construct 8- 10 (interesting!) questions about your topic

  • What the most common security issue is with these devices?
  • Is there an easy way to protect these devices?
  • Do the manufacturers intend to improve security on their IoT products?
  • Is there an increasing number of attacks on IoT Devices?
  • Are any third party companies working on a solution? e.g. Norton, Cisco etc.
  • To the devices share similar software?
  • How many households already have IoT devices?
  • How long have IoT devices been around for?

 

Identify two good questions/ideas  

  • Is there an easy way to protect these devices?
  • Is there an increasing number of attacks on IoT Devices?

For each of them suggest what you could do to answer/explore it.

  • Research companies that specialize in security/ IoT security.
  • Look at statistics of attacks on IoT devices.

 

What is the fundamental goal underlying both of the questions?

To find out if the number of attacks on IoT devices and if there is a simple way to prevent them.

Broad Research/Project Interest Area

Description of area of IT that interests you

Network Security. Focusing on problems with securing new technology such as IoT (Internet of Things) Devices.

Why is it interesting to you?

I have always been interested in security and protection of networks, whether it is your home network or a business. Since starting my SEC601 class this semester and listing to Mark talk about some of the problems with IoT devices, I have wanted to more. This is because I believe we are only at the starting point for IoT devices and within the next few years, they will be common items in most houses just like computers.  

Three things you know about it

  • There are huge problems with the security of these devices, because unlike a computer or phone running a rather complicated OS, IoT devices are a lot simpler.
  • These devices have comprised networks before.
  • More and More IoT devices are being made.

Three things you believe about it

  • That these devices will be in almost every home within 10 – 15 years.
  • A lot of people don’t think about IoT devices being a security issue.
  • There will be a growing number of jobs for people who specialise in IoT security.

Three things you don’t know about it

  • What the most common security issue is with these devices?
  • Is there an easy way to protect these devices?
  • Do the manufactures intend to improve security on their IoT products?

Would you rather Do something, Research something or do both?

I think do both, as I have learned in the past trying to do something you are not sure of can cause issues they may be worse than the initial problem.

Find an online resource about it:

Link about IoT Security Issues.

Academic Papers

For lasts weeks blog we were asked to find two academic papers related to IT. We were then asked to answer the questions below for each paper. Sorry I was late on this one Clare I have been tied other with other assignments.

How are we searching the World Wide Web? A comparison of nine search engine transaction logs

Title and author(s) of the article

  • Name: How are we searching the World Wide Web? A comparison of nine search engine transaction logs
  • Author: Bernard J. Jansen, Amanda Spink

APA Reference

  • Jansen, Bernard J., and Amanda Spink. “How are we searching the World Wide Web? A comparison of nine search engine transaction logs.”Information Processing & Management 42.1 (2006): 248-263.

How you found the article and what keywords you used

  • Search Engine: Google Scholar
  • Term used: “Search engines”

What kind of article it is?

  • Journal Paper

Why do I think it is credible?

The reason I believe this paper is credible because on Google Scholar it has been Cited by over 800 people to date. Also because the article has a very large reference list which makes me think they have done thorough research.

How well it fits the ‘structure of an academic article’ that I described in my previous post

I believe this paper meets all of the main components descried.

How many references it has

Roughly 53 references, that could be out by a couple as they are hard to tell where they start and finish in this document.

How many citations it has

  • 802 citations

URL:

http://www.sciencedirect.com/science/article/pii/S0306457304001396

Say whether you are interested in properly reading the article or not (and give some reasons!)

Yes because I am interested to see how people search the internet.

 

Secure Virtualization Technology  

Title and author(s) of the article

  • Name: Secure Virtualization Technology
  • Author: Farzad Sabahi

APA Reference

How you found the article and what keywords you used

I first started on NMIT databases, then went to ProQuest and search “Cloud Computing Security”.

What kind of article it is?

  • Journal Paper

Why do I think it is credible?

I think this article is credible because of the amount of references listed in it, also because I used ProQuest to find it.

How well it fits the ‘structure of an academic article’ that I described in my previous post

I believe this paper meets all of the main components descried.

How many references it has

  • 14

How many citations it has

  • Two

URL:

http://llcp.nmit.ac.nz:2345/docview/1466801411/abstract/3972EB1103394617PQ/20?accountid=40261

Say whether you are interested in properly reading the article or not?

Yes because I am very interested in Cloud Computing and keep hearing about security concerns but don’t actually know what any of them are!

 

Credible Evidence

For this week’s blog we were asked to get three sources of evidence for two topics Virtualization Technology and Digital Citizenship, and at least four different types of information all together, and answer write a blog post for each source. One thing I noticed when trying to search for academic paper using Google Scholar, is just about every link wants you to buy that chapter or even the whole book. Half the time I couldn’t even read enough of a preview to see if it was the right thing I was looking for. I understand now why people like Aaron Swartz tried to make the information freely available to people.

 

Virtualization Technology

Source One:

  • View the link here
  • “Virtualization paper”
  • Google
  • VMware Inc.
  • 2006
  • Academic paper
  • I think this paper is a very credible peace of information, this is because VMware are one of the leaders in virtualization technology. I have also used their software before in my some of

my classes, so since I have experience using it I am more inclined to think it is credible.

Source Two:

  • View the link here
  • “Virtualization white paper
  • Google
  • Oracle
  • October 2010
  • White paper
  • I think this this white paper is also credible, this is because Oracle are also a leading virtualization technology company.

Source Three:

  • View the link here
  • “Virtualization”
  • YouTube
  • Eli the computer guy
  • 3/2/2012
  • Video
  • I also believe this information is credible. This is because not only has it got nearly half a million views on YouTube, but I have spent many hours watching Eli’s videos and I definitely think he knows his stuff.

 

 

Digital Citizenship

Source One:

  • View the link here
  • “Digital Citizenship”
  • YouTube
  • cyberwise.org
  • 10/06/2015
  • Video
  • I think this video is very credible, as this is a company devoted to educating people about Digital Citizenship.

Source Two:

  • View the link here
  • “Digital Citizenship articles”
  • Google
  • Mike Ribble
  • 01/01/2009
  • Article
  • I believe this article is credible, this is solely because it states that the author has been studying digital citizenship for five years.

Source Three:

  • View the link here
  • “Digital Citizenship”
  • YouTube
  • Xin Zhang
  • 11/01/2012
  • Video
  • I think this is credible, this is because I agree with the points that are being made. Also because it is not overly complicated it is just a clean and simple introduction to Digital Citizen ship.

 

Alfred!

When people think of home security they usually think of the price, whether its installing an alarm or surveillance cameras. Now there is a way you can do it for free (well it does depend, you need android phone/s and Wi-Fi), but anyway the app is free!

Okay so if you’re tech savvy you might already be connecting the dots, but wait it’s probably better than you think. All you need is two or more Android phones.  It doesn’t matter if it’s that old phone that been acting as a paper weight for the last two years as long as it has a camera. Now all you need to do is download the Alfred App on each phone, sign in with your Google account and choose either viewer or camera and boom you’ve got a live feed.

Not only can you view this from anywhere with 3/4G or Wi-Fi, but you can also set it to motion which will only record when the camera picks up movement, which it will then notify you about. You can also enable two-way communication, so if someone is trying to steal your stuff you may be able to deter them, or maybe you want to just talk to your pet when you’re at work or tell them off for chewing on something. You can also set up multiples phones around the house for full coverage, and after playing with this app I was very surprised how easy it was to set up and use.

This was the first bit of information I looked at when thinking of writing a blog on this subject. I think this is credible because not only is it a video made by the company but we can test the features that they advertise.

http://www.phonearena.com/news/Alfred-home-security-IP-cam-app-brings-home-video-surveillance-on-the-cheap_id78042

When I was looking up reviews on the app I came across this article, which sums up the key features of the app. I also think this is credible as it provides clear pictures of the phones that once again we can verify for ourselves.

 

This final video was a review done by a YouTube channel called TechCrunch. Although it is a humorous form of review I still think the information is credible, because there is clear footage showing it in use. I tried to find some piece of information that I would consider not to be credible, but since it is a relatively new app, there were none that I considered contained that criteria.