The most important part of any communication medium and technology is
Here are seven steps that each company should take as they formulate their long-term IoT security strategy:
Identify the primary information flows in the organizations and, especially, the sets of data that feed core computational systems, even if that data is not collected or transmitted electronically today. Wherever data collection or data consumption creates business value, you should expect to one day see connected (IoT) devices.
Categorize the types of IoT devices expected and their baseline management requirements, for example, device discovery, inventory, remote configuration, monitoring, and software upgrade. Prioritize by timeframe.
Define and prioritize the new risks of data loss, especially new vectors that emerge due to the fragmentation of embedded operating systems, networks, and interfaces.
Quantify the risk of unauthorized access to these devices. For example, if a factory automation device on a manufacturing floor or
Define the associated security actions to be triggered, such as the circumstances under which a device that is compromised would be taken off the connected network.
Develop privacy policies for sensor data. The proliferation of sensors will result in more and more personal data on, for example, health information from medical devices. The access to and the security of this data will have many privacy implications with limited guidance from existing case law.
Protect these new connected devices against network intrusions and