• Log In
  • Skip to main content
  • Skip to primary sidebar

Ethical Hacking

Wade Mackey

The Increase in Scope of Cybersecurity from Software to Hardware Protection

September 19, 2021 by Matthew Bryan 1 Comment

Consumer focused hardware companies are delivering more products than ever before due to the popularity of IoT technology. IoT devices promise to save consumers time and money by automating repeat takes and applying insights that previously weren’t possible. “The GSM Association estimates that by 2025 there will be almost 25 billion IoT devices deployed in the world.” The prevalence of IoT hardware comes with an increased cybersecurity risk.

Connected hardware has an increased cybersecurity risk because it is tangible. In other words, it can directly affect the world in which it resides.  The article provides an interesting example of a robot being compromised and directed to move to a new location to be sold for parts.

The author provides a few suggestions for hardware manufacturers to pursue to help increase cybersecurity in their products.

  • Design with cybersecurity in mind and allow products to be updated in response to new threats.
    • Improve firmware verification and error checking.
    • Support for encryption methods like AES, DES, etc.
    • Adding secure key storage 
  • Expand Data Access Controls
    • User vetting and verification must be added to the user authentication pipeline. 
      • “Keys and other access mechanisms are methods, they are not proofs of identity. We cannot blindly trust the keyholder. This is security backward. The keyholder must be vetted as well.”
  • Increase CIO/CISO Roles in hardware IoT companies
    • Companies cannot afford to risk losing competitive advantages by not having CIO/CISO

Article: The Increase in Scope of Cybersecurity from Software to Hardware Protection

Author: Neil Okikiolu

Published: September 8, 2021

Link: https://cisomag.eccouncil.org/the-increase-in-scope-of-cybersecurity-from-software-to-hardware-protection/

Tagged With: Week 3

Reader Interactions

Comments

  1. Vanessa Marin says

    September 20, 2021 at 12:43 pm

    Excellent points. Matthew. The blend between unsecure IoT devices and sometimes lacking cloud infrastructure has opened up a serious can of vulnerabilities. Organizations need to rethink their security posture and re-evaluate their current states. Frankly third party risk is astronomical! The cloud has broken boundaries and exponentially opened the vectors through which an attacker can attempt to infiltrate. Many unknowns in this evolving threat landscape and it takes truly an innovative mind to rethink the pre-covid vs post-covid threat landscape.

    ~Vanessa

    Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Weekly Discussions

  • Uncategorized (1)
  • Week 1 (1)
  • Week 10 (1)
  • Week 11 (1)
  • Week 12 (2)
  • Week 2 (2)
  • Week 3 (1)
  • Week 4 (2)
  • Week 5 (3)
  • Week 6 (2)
  • Week 6 (0)
  • Week 7 (5)
  • Week 8 (5)

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in