Page 138 -
P. 138
SeCUrity GUiDe Hacking Smart Things
from large corporations, government insiders leaking sen- your vehicle, he or she could then remotely control various 137
sitive information, or cyberattacks launched from around functions of the vehicle (e.g., the brakes), keep tabs on your
the globe. GPS coordinates, activate the Bluetooth microphone and
What does this have to do with you? Well, you have listen to anything taking place inside of the car, or access
10
sensitive information, too. How would you feel if your bank data about the vehicle’s operations and performance.
statements, medical records, and email history for the past The thought of someone eavesdropping on your conver-
5 years were stolen and posted online? You probably are tak- sations in the car is bad enough. But what would happen
ing steps to avoid these threats like running antivirus soft- if the hacker activates the brakes, or disables them, while
ware, enabling automatic updates, using your operating you are driving? What happens when driverless cars be-
system’s default firewall, avoiding suspicious emails, and come widely adopted and hackers could have complete
staying away from shady Web sites. control over the vehicle?
But what about securing your data stored on these new As more and more devices are accessible over some
Internet-enabled smart devices? Think about the security form of network, users will have to weigh the pros and the
implications of having to protect 10, 20, or 30 different cons of using them. But securing these new smart devices
Internet-enabled devices in your home. Will you have to buy will take additional work. The same thing that makes these
antivirus software for your refrigerator or configure a fire- devices great will also make them vulnerable to attack. Yes,
wall on your thermostat? Could a hacker hijack the webcam of course, a smart thermostat will save you money. But
in your living room or, worse, actually hijack your car? what happens when it gets a virus? Will you be the one run-
ning a temperature?
Taking Back-Seat Driver to a Whole
New Level
Yes, a hacker could potentially compromise your car if it
is connected to the Internet. If a hacker takes control of
DiSCUSSion QUeStionS
1. How many devices in your home are connected to the 3. Has this guide changed your perception of the Internet
Internet? How much time do you spend daily, weekly, or of Things? Do the benefits of smart devices outweigh
monthly trying to ensure that these devices have the lat- the risk of data loss or your personal privacy? Why or
est updates and are secure? What are the implications of why not?
maintaining dozens of smart devices? 4. The Internet of Things is not solely focused on home au-
2. The guide discusses the potential threat of a hacker tomation or private consumer products. Businesses are
accessing a vehicle and downloading data about the using the Internet of Things to manage supply chains
car’s performance and operations. Aside from a mali- and streamline various business processes. What bene-
cious hacker acting alone, are there any businesses or fits or risks are associated with businesses adopting new
government agencies that could benefit from accessing Internet-enabled devices?
these data? How?