{"id":248999,"date":"2024-08-22T09:42:43","date_gmt":"2024-08-22T08:42:43","guid":{"rendered":"https:\/\/mactwin.com\/security-and-the-internet-of-things-opportunities-and-threats\/"},"modified":"2024-10-03T08:31:53","modified_gmt":"2024-10-03T07:31:53","slug":"security-and-the-internet-of-things-opportunities-and-threats","status":"publish","type":"post","link":"https:\/\/mactwin.com\/en\/security-and-the-internet-of-things-opportunities-and-threats\/","title":{"rendered":"Security and the Internet of Things: opportunities and threats"},"content":{"rendered":"<div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last\" style=\"--awb-bg-size:cover;\"><div class=\"fusion-column-wrapper fusion-flex-column-wrapper-legacy\"><div class=\"fusion-text fusion-text-1\"><h1>Security and the Internet of Things: opportunities and threats<\/h1>\n<p><strong>Just as we have to deal with crime and vandalism in the analogue world, the same is happening in the digital world.<br \/>\nEspecially with the further rise of IoT (Internet of Things).<br \/>\nWhat is going on and what can you do about it? <\/strong> IoT (Internet of Things) refers to the unlocking of all kinds of devices via the internet.<br \/>\nThis allows appliances, ranging from a coffee maker and thermostat to a scale or refrigerator, to &#8220;talk&#8221; to each other.<br \/>\nWhen these devices are connected to the internet, they can make our lives easier.<br \/>\nSecurity devices are also part of the Internet of Things and can therefore send and receive data via the internet.<br \/>\nThis provides ease of use and\/or a higher level of security.<br \/>\nIt also offers new possibilities, such as receiving video images on a tablet or smartphone, reading the status of the burglar alarm system via an app or opening a door via phone.<br \/>\nUnfortunately, there are also risks associated with unlocking devices via the internet.<\/p>\n<h3>Large-scale hack via security cameras<\/h3>\n<p>In the media, we regularly see reports of hacks on security systems.<br \/>\nMost recently, in October 2016, there was a major attack on the American internet provider Dyn.<br \/>\nIt was carried out by an estimated 100,000 components around the world.<br \/>\nAfter analysis, it turned out that a manufacturer of CCTV Cameras (Mirai) had delivered the cameras in such a way that hackers could log in with the default username and passwords.<br \/>\nBecause these cameras were accessible to hackers via the internet, they could easily install a program on the cameras and with that, a massive attack was carried out on the DNS provider Dyn.<br \/>\nThe attack left services and sites like Twitter, the Guardian, Netflix, Reddit, and CNN unreachable and unusable.<\/p>\n<h3>Measures<\/h3>\n<p>How can these types of attacks be prevented?<br \/>\nWe asked William de Ruijter, ICT Specialist at Mactwin Security.<br \/>\n&#8220;In the digital world, as in the analogue world, we need to take measures that detect an attack immediately and slow it down to such an extent that the criminal is caught for achieving his goal or is discouraged to such an extent that he refrains from making further attempts.<br \/>\nThe following measures should be taken as standard, usually by the installer of the security equipment:<\/p>\n<ul>\n<li>change all set default passwords;<\/li>\n<li>installing a firewall that ensures that only those systems communicate to the outside world for which it is strictly necessary;<\/li>\n<li>Scanning devices for unnecessary services and protocols and deactivating them as much as possible.<\/li>\n<\/ul>\n<p>Unfortunately, it is not always possible to take (all) these measures. For example, in the aforementioned hack, it turned out that the manufacturer had neglected to enable the installer to disable unused services (telnet\/ssh) on the device. In many cases, the user interface of the camera or video recorder was unaware of the existence of these services. Changing the (default) password on these services was not possible for the installer due to the lack of the option in the user interface.&#8221;<\/p>\n<\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last\" style=\"--awb-bg-size:cover;--awb-margin-top:30px;--awb-margin-bottom:20px;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-column-wrapper-legacy\"><div class=\"fusion-image-element in-legacy-container\" style=\"--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-1 hover-type-none\"><a class=\"fusion-no-lightbox\" href=\"https:\/\/www.linkedin.com\/company\/mactwin-security\/\" target=\"_self\" aria-label=\"MinibannervolgopLinkedin\"><img decoding=\"async\" width=\"800\" height=\"105\" alt=\"Volg ons op Linkedin\" src=\"https:\/\/mactwin.com\/wp-content\/uploads\/2020\/06\/MinibannervolgopLinkedin.jpg\" class=\"img-responsive wp-image-15560 no-lazyload\" srcset=\"https:\/\/mactwin.com\/wp-content\/uploads\/2020\/06\/MinibannervolgopLinkedin-200x26.jpg 200w, https:\/\/mactwin.com\/wp-content\/uploads\/2020\/06\/MinibannervolgopLinkedin-400x53.jpg 400w, https:\/\/mactwin.com\/wp-content\/uploads\/2020\/06\/MinibannervolgopLinkedin-600x79.jpg 600w, https:\/\/mactwin.com\/wp-content\/uploads\/2020\/06\/MinibannervolgopLinkedin.jpg 800w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/><\/a><\/span><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div>\n<div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-2 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last\" style=\"--awb-bg-size:cover;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-column-wrapper-legacy\"><div class=\"fusion-text fusion-text-2\"><h3>Security<\/h3>\n<p>&#8220;Network security in general has become increasingly important,&#8221; William continues.<br \/>\n&#8220;Sometimes firewalls from a location to the outside world are excellently set up and well monitored, but then the attack comes from a different angle. A well-known example is the so-called Target hack, in which a supplier of climate control systems was infected with malware. Through the connection to the Target network, credit card information could be stolen from millions of people. Obviously, suppliers need to have their affairs in order, but in this case, Target&#8217;s IT department should have been better equipped against such attacks. The question is whether these networks should have been linked at all and whether the surveillance could not have been better.&#8221;<\/p>\n<h3>What can Mactwin do for you?<\/h3>\n<p>Large-scale digital attacks are becoming more common.<br \/>\nIt is therefore important to apply several layers of security, take adequate measures and always use up-to-date software.<br \/>\nBased on its vision of security, Mactwin not only looks at the question and objectives of every security issue, but also at organizational processes and the (possible) vulnerabilities in IP security components.<br \/>\nFrom the <a href=\"https:\/\/mactwin.com\/diensten\/remote-diensten\/\" target=\"_blank\" rel=\"noopener noreferrer\">Mactwin Operation Center<\/a> , Mactwin continuously monitors systems and their components and provides them with the most up-to-date software and security updates.<\/p>\n<\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-3 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last\" style=\"--awb-padding-top:25px;--awb-padding-right:25px;--awb-padding-bottom:25px;--awb-padding-left:25px;--awb-overflow:hidden;--awb-bg-size:cover;--awb-border-color:#ee7824;--awb-border-top:1px;--awb-border-right:1px;--awb-border-bottom:1px;--awb-border-left:1px;--awb-border-style:solid;--awb-border-radius:5px 5px 5px 5px;--awb-margin-top:50px;--awb-margin-bottom:50px;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-column-wrapper-legacy\"><div class=\"fusion-text fusion-text-3\"><p>Sources used: <a href=\"https:\/\/en.wikipedia.org\/wiki\/2016_Dyn_cyberattack\">https:\/\/en.wikipedia.org\/wiki\/2016_Dyn_cyberattack<\/a><a href=\"http:\/\/thehackernews.com\/2016\/10\/ddos-attack-mirai-iot.html\">http:\/\/thehackernews.com\/2016\/10\/ddos-attack-mirai-iot.html<\/a><\/p>\n<p><a href=\"https:\/\/krebsonsecurity.com\/2016\/10\/hacked-cameras-dvrs-powered-todays-massive-internet-outage\/\">https:\/\/krebsonsecurity.com\/2016\/10\/hacked-cameras-dvrs-powered-todays-massive-internet-outage\/<\/a><\/p>\n<p><a href=\"https:\/\/www.cio.com\/nl\/security\/\" rel=\"\">http:\/\/cxo.nl\/security\/81528-analyse-hoe-heeft-de-target-hack-kunnen-plaatsvinden<\/a><\/p>\n<\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Just as we have to deal with crime and vandalism in the analogue world, the same is happening in the digital world.<br \/>\nEspecially with the further rise of IoT (Internet of Things).<br \/>\nWhat is going on and what can you do about it?  <\/p>\n","protected":false},"author":6,"featured_media":274646,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_bbp_topic_count":0,"_bbp_reply_count":0,"_bbp_total_topic_count":0,"_bbp_total_reply_count":0,"_bbp_voice_count":0,"_bbp_anonymous_reply_count":0,"_bbp_topic_count_hidden":0,"_bbp_reply_count_hidden":0,"_bbp_forum_subforum_count":0,"wds_primary_category":0,"footnotes":""},"categories":[500,505,506],"tags":[537,535,534],"class_list":["post-248999","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-articles","category-fire-safety","category-video-surveillance","tag-camera-surveillance","tag-camera-system","tag-security-camera"],"_links":{"self":[{"href":"https:\/\/mactwin.com\/en\/wp-json\/wp\/v2\/posts\/248999","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mactwin.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mactwin.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mactwin.com\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/mactwin.com\/en\/wp-json\/wp\/v2\/comments?post=248999"}],"version-history":[{"count":0,"href":"https:\/\/mactwin.com\/en\/wp-json\/wp\/v2\/posts\/248999\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/mactwin.com\/en\/wp-json\/wp\/v2\/media\/274646"}],"wp:attachment":[{"href":"https:\/\/mactwin.com\/en\/wp-json\/wp\/v2\/media?parent=248999"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mactwin.com\/en\/wp-json\/wp\/v2\/categories?post=248999"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mactwin.com\/en\/wp-json\/wp\/v2\/tags?post=248999"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}