{"id":32,"date":"2021-09-19T19:48:40","date_gmt":"2021-09-19T23:48:40","guid":{"rendered":"https:\/\/community.mis.temple.edu\/mis5211sec002fall2021\/?p=32"},"modified":"2021-09-19T20:02:02","modified_gmt":"2021-09-20T00:02:02","slug":"the-increase-in-scope-of-cybersecurity-from-software-to-hardware-protection","status":"publish","type":"post","link":"https:\/\/community.mis.temple.edu\/mis5211sec002fall2021\/2021\/09\/19\/the-increase-in-scope-of-cybersecurity-from-software-to-hardware-protection\/","title":{"rendered":"The Increase in Scope of Cybersecurity from Software to Hardware Protection"},"content":{"rendered":"<p><span style=\"font-weight: 400\">Consumer focused hardware companies are delivering more products than ever before due to the popularity of IoT technology. IoT devices promise to save consumers time and money by automating repeat takes and applying insights that previously weren\u2019t possible. \u201cThe GSM Association estimates that by 2025 there will be almost 25 billion IoT devices deployed in the world.\u201d The prevalence of IoT hardware comes with an increased cybersecurity risk.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Connected hardware has an increased cybersecurity risk because it is tangible. In other words, it can directly affect the world in which it resides.\u00a0 The article provides an interesting example of a robot being compromised and directed to move to a new location to be sold for parts.<\/span><\/p>\n<p><span style=\"font-weight: 400\">The author provides a few suggestions for hardware manufacturers to pursue to help increase cybersecurity in their products.<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Design with cybersecurity in mind and allow products to be updated in response to new threats.<\/span>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Improve firmware verification and error checking.<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Support for encryption methods like AES, DES, etc.<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Adding secure key storage\u00a0<\/span><\/li>\n<\/ul>\n<\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Expand Data Access Controls<\/span>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">User vetting and verification must be added to the user authentication pipeline.\u00a0<\/span>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">\u201c<\/span><span style=\"font-weight: 400\">Keys and other access mechanisms are methods, they are not proofs of identity. We cannot blindly trust the keyholder. This is security backward. The keyholder must be vetted as well.\u201d<\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Increase CIO\/CISO Roles in hardware IoT companies<\/span>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Companies cannot afford to risk losing competitive advantages by not having CIO\/CISO<\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><strong>Article<\/strong>: The Increase in Scope of Cybersecurity from Software to Hardware Protection<\/p>\n<p><strong>Author<\/strong>: Neil Okikiolu<\/p>\n<p><strong>Published<\/strong>: September 8, 2021<\/p>\n<p><strong>Link<\/strong>: <a href=\"https:\/\/cisomag.eccouncil.org\/the-increase-in-scope-of-cybersecurity-from-software-to-hardware-protection\/\">https:\/\/cisomag.eccouncil.org\/the-increase-in-scope-of-cybersecurity-from-software-to-hardware-protection\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Consumer focused hardware companies are delivering more products than ever before due to the popularity of IoT technology. IoT devices promise to save consumers time and money by automating repeat takes and applying insights that previously weren\u2019t possible. \u201cThe GSM Association estimates that by 2025 there will be almost 25 billion IoT devices deployed in [&hellip;]<\/p>\n","protected":false},"author":26653,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[78],"tags":[],"class_list":{"0":"post-32","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-week-3","7":"entry"},"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/community.mis.temple.edu\/mis5211sec002fall2021\/wp-json\/wp\/v2\/posts\/32","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/community.mis.temple.edu\/mis5211sec002fall2021\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/community.mis.temple.edu\/mis5211sec002fall2021\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5211sec002fall2021\/wp-json\/wp\/v2\/users\/26653"}],"replies":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5211sec002fall2021\/wp-json\/wp\/v2\/comments?post=32"}],"version-history":[{"count":1,"href":"https:\/\/community.mis.temple.edu\/mis5211sec002fall2021\/wp-json\/wp\/v2\/posts\/32\/revisions"}],"predecessor-version":[{"id":33,"href":"https:\/\/community.mis.temple.edu\/mis5211sec002fall2021\/wp-json\/wp\/v2\/posts\/32\/revisions\/33"}],"wp:attachment":[{"href":"https:\/\/community.mis.temple.edu\/mis5211sec002fall2021\/wp-json\/wp\/v2\/media?parent=32"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5211sec002fall2021\/wp-json\/wp\/v2\/categories?post=32"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5211sec002fall2021\/wp-json\/wp\/v2\/tags?post=32"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}