Page 138 -
P. 138

SeCUrity GUiDe  Hacking Smart Things






                    from large corporations, government insiders leaking sen-  your vehicle, he or she could then remotely control various   137
                    sitive information, or cyberattacks launched from around   functions of the vehicle (e.g., the brakes), keep tabs on your
                    the globe.                                         GPS coordinates, activate the Bluetooth microphone and
                       What  does this have to  do with you?  Well, you have   listen to anything taking place inside of the car, or access
                                                                                                                    10
                    sensitive information, too. How would you feel if your bank   data about  the  vehicle’s operations and  performance.
                    statements, medical records, and email history for the past   The thought of someone eavesdropping on your conver-
                    5 years were stolen and posted online? You probably are tak-  sations in the car is bad enough. But what would happen
                    ing steps to avoid these threats like running antivirus soft-  if the hacker activates the brakes, or disables them, while
                    ware, enabling automatic updates, using  your operating   you are driving? What happens when driverless cars be-
                    system’s default firewall, avoiding suspicious emails, and   come  widely adopted and  hackers could  have complete
                    staying away from shady Web sites.                 control over the vehicle?
                       But what about securing your data stored on these new   As more and more devices are accessible over some
                    Internet-enabled smart devices? Think about the security   form of network, users will have to weigh the pros and the
                    implications of  having  to  protect 10, 20, or 30 different   cons of using them. But securing these new smart devices
                      Internet-enabled devices in your home. Will you have to buy   will take additional work. The same thing that makes these
                    antivirus software for your refrigerator or configure a fire-  devices great will also make them vulnerable to attack. Yes,
                    wall on your thermostat? Could a hacker hijack the webcam   of course, a smart  thermostat  will save  you money. But
                    in your living room or, worse, actually hijack your car?  what happens when it gets a virus? Will you be the one run-
                                                                       ning a temperature?
                    Taking Back-Seat Driver to a Whole
                    New Level
                    Yes, a hacker could potentially compromise your car if it
                    is connected to the Internet. If a hacker takes control of








                                DiSCUSSion QUeStionS


                    1.  How many devices in your home are connected to the   3.  Has this guide changed your perception of the Internet
                      Internet? How much time do you spend daily, weekly, or   of Things? Do the benefits of smart devices outweigh
                      monthly trying to ensure that these devices have the lat-  the risk of data loss or your personal privacy? Why or
                      est updates and are secure? What are the implications of   why not?
                      maintaining dozens of smart devices?             4.  The Internet of Things is not solely focused on home au-
                    2.  The guide  discusses the potential threat  of  a  hacker   tomation or private consumer products. Businesses are
                        accessing a  vehicle and downloading data about  the   using the Internet of Things to manage supply chains
                      car’s  performance and operations. Aside from a mali-  and streamline various business processes. What bene-
                      cious hacker acting alone, are there any businesses or   fits or risks are associated with businesses adopting new
                      government agencies that could benefit from accessing   Internet-enabled devices?
                      these data? How?
   133   134   135   136   137   138   139   140   141   142   143