The Internet of Things is based on sensors and controls in all sorts of devices. When those types of devices are used to create a smart home, they can give residents unprecedented control and insight. The proliferation of smart devices, however, also opens the door to new dangers and threats.
According to research architect Brandon Creighton, with application security provider Veracode, "At the end of the day, you're installing a device that is really just a tiny computer." Even with something as simple as a smart light socket that you can control remotely with your phone, what makes that possible is the little computer in the switch that can talk to the Internet — which means that Internet users can talk back.
"The same technology that enables us to build these quite complex devices also creates the potential for security vulnerabilities," said Creighton. "And the vulnerabilities will inevitably be found."
A recent report from HP, the Internet of Things Security Study: Home Security Systems Report, gives some idea of the extent of the problem. According to the report, "HP reviewed 10 of the newest home security systems revealing an alarmingly high number of authentication and authorization issues along with concerns regarding mobile and cloud-based web interfaces. The intent of these systems is to provide security and remote monitoring to a home owner, but given the vulnerabilities we discovered, the owner of the home security system may not be the only one monitoring the home."
What's a homeowner to do? While it's practically impossible to stop a determined professional hacker, there are steps you can take to at least make their task more difficult, and to discourage the simpler attacks. Think of these seven steps as the connected home equivalent of putting locks on your windows or stopping your newspaper delivery while you're on vacation.
1. Be aware of the data each device can capture
Daniel Miessler, practice principal at HP Fortify On Demand, HP's managed security testing solution, led the research behind the security study. "Understand the sensors that are at play on the device," said Miessler. "So, for example, does your TV have a camera that's facing out? Where is it facing — the entire living room? The bedroom?" Whenever you deploy something with sensors in your home, you're raising your risk of unauthorized access.
"In our recent report," Miessler continued, "the scariest thing was being able to remotely monitor homes, basically including their video cameras. Because it was security systems that we tested, 10 out of 10 had this problem — it wasn't just watching the camera, it was also knowing when you're home and when you're not." Whatever further steps you take to secure your home will rely on understanding what holes you're trying to plug; for example, by making sure any cameras are pointed only at the specific areas you're concerned about.
Sign up for MIS Asia eNewsletters.