Imagine a situation in which we have plenty of time because the shop is doing for us fridge, always taking care of it, we have all the ingredients for a dish that the day you plan to cook. Imagine that when you wake up in the morning, in a coffee waiting for you hot coffee, pop out of the toaster toast ready, and the speakers echoed motivating song, adapted perfectly under your mood. Here’s our reality, which dominates the internet of things.
What is, therefore, the Internet of things? It is a network of interconnected devices with built-in computers. Currently, most manufactured home appliances have them control ICs, and therefore sellers often give them the adjective “smart”. Before our eyes, grows also internet of things – a network in which to communicate with each machine.
Of course, at first glance it looks like a dream come true, where the tedious and time-consuming responsibilities are the domain of machines. A deeper analysis of this vision, however, brings a lot of doubts. Already, the developed countries, the threat of the outbreak of cyberwar, global conflict in which weapons are sophisticated viruses and worms. Unfortunately, the internet of things also raises concerns regarding online privacy. Tight setting up the machines and give them the majority of daily duties associated with the accumulation of vast amounts of personal information. Where we buy, what we eat, how often you are not at home, we have habits, what we get sick – all this will be observing us know your computer.
– Already intelligence agencies are going in the future begin to access the data collected by the device Internet of Things (IoT), which are increasingly being targeted by criminals and terrorist organizations – warns the chief of US intelligence, James Clapper. His words quoted portal Electronic Times.
Experts point out that the infected machine IoT may become one of the greatest threats to cybersecurity in 2016. With Dark Reading report shows that this year, hackers will focus their efforts on IoT devices and create botnets of them – the so-called. Botnet things. Before a similar threat warned in Poland Kosciuszko Institute in their recommendations for cybersecurity and forecasts for 2016.
– In the future, the intelligence services can use the IoT to identify, supervise, monitor, locate, detect recruitment (recruitment), or to access the network and user data – I explained earlier this week Clapper speaking before Congress . However, as notes portal Electronic Times, the head of US intelligence is not made clear on exactly what services he meant. It stressed, however, that the experts point out that spying devices IoT will be done in a similar way to mobile surveillance – services will capture signals transmitted by the device.
It was recalled that the risks associated with the IoT illustrates the experiment conducted by two hackers: Charlie Miller and Chris Valasek. A pair gained remote access to a car, which was traveling on the highway a couple of journalists at a speed of over 110 km per hour. We managed to take control of vehicle systems, including the air conditioning or multimedia running on Linux. The hackers were also able to cut off the brake and turn off the engine. All this was made possible from a distance of approx. 16 km away.
See also: House itself protect against burglary
No comments:
Post a Comment