PCQuest

Lagging Areas

Challenges of security in the age of IoT

- Dr. Archana Verma archanav@cybermecur­ity.co.in

“With digitisati­on comes many possible security threats. Cyber Security comes as part of the system design and today threats have emerged possibly due to gaps in infrastruc­ture or the system, which needs to be addressed. It is therefore imperative to incorporat­e it in the system design stage itself.”

—Gaurav Gupta, Principal Secretary, Department of IT, BT and S&T, Government of

Karnataka “In the context of all-pervasive digitisati­on, rich content delivery, rapid innovation, high speed transactio­ns and every user enterprise turning digital, it becomes imperative for Security to catch up.” —Rama Vedashree,

CEO, DSCI

Hardware Security

With the coming of the IoT devices, the concept of security is also undergoing change. While a lot of effort is being used on evolving security software solutions, for many people these security softwares may be expensive and therefore, out of regular reach. In such a scenario, hardware security will be of utmost importance. This gives rise to another problem viz., the skills needed for accessing the security features in x86 in Windows and Advanced RISC Machines (ARM) are very rare. Hence, there is a pertinent need to impart these skills to IT profession­als.

Infrastruc­tural security has to do with Networking Functions Virtualisa­tions (NFV), which uses virtual machines ( VMs) to manage several functions in the hardware. In the pre-IoT era, the Internet transmits messages without using them for predictive analysis of any kind. But with the coming IoT, messages will be transmitte­d with many kinds of analytical interpreta­tions associated with them. This will require end to end security. NFV will have to enable it in gateways, transport networks, clouds and DCs. This is a new technology, so the tools and products that enable this security are only coming up at the moment.

Cloud and Automation

Clouds will become the only platforms to serve the IoT devices. Cloud technology is compliant with virtualisa­tion of networking, but more designed for data management, processing and storage. Automation and a focus on heterogeno­us operating systems will require a security system to serve their unique needs. IoT risk managers have too be trained in this system.

As more and more IT work will be done by softwares, they will have to be imparted with security standards that reduce the vulnerabil­ity level. The IoT products are released to the market on a fast track for commercial reasons without developing proper security systems around them. This will need to be addressed by the developers.

As the society moves towards IoT wold, it is imperative to address these challenges quickly.

 ??  ??
 ??  ??

Newspapers in English

Newspapers from India