i3 - January/February 2017 - 18

Tech

By Susan Schreiner

C 4 T R E N DS

 C

ybersecurity threats and privacy invasion are
daily news with Snowden, Assange, WikiLeaks
and foreign hackers breaking into government,
political, health, banking and other sites. From
the Sony breach to the DNC hacking - cyberpunks aim to
steal intellectual property, intelligence and information.
Cyber attacks will get more challenging
in the always-on Internet of Things (IoT)
connected universe. Thousands of new
devices vulnerable to cyber attacks are being
attached to the internet, many running lowpower processors incapable of supporting
sophisticated security. And many embedded
devices continue to operate for years after
their last software patch.
In October, traffic at websites including
Twitter, Spotify and PayPal was slowed or
stopped, because they were flooded with
internet traffic. This DDoS (Distributed
Denial of Service) attack reportedly used
internet-enabled cameras from Hangzhou
Xiongmai Technology, a Chinese electronics component manufacturer. The
attackers exploited weak or manufacturer
set passwords that hadn't been reset by
users. Malware known as Mirai took
advantage of these vulnerabilities by
infecting the devices and using them
to launch massive DDoS attacks,
deluging websites and taking
them offline.
IoT security poses unusual

risks. It is one thing to steal usernames,
passwords or intellectual property, but it's
entirely different to gain access to systems
that can interfere with people directly.
Any connected device can be hacked,
including a thermostat, smart appliance,
connected wearable or even a child's
Barbie doll that is connected to the IoT.

CTA Steps Up
Cybersecurity Efforts
CTA is working with our member
companies on multiple programs to
improve cybersecurity. Recent work
includes revising CTA-TR-12, Securing
Connected Devices for Consumers in
the Home, which provides guidance
to product designers and managers
on how to enhance cybersecurity;
developing guidance for product
installers to get the best security out of
existing devices; and helping develop
and launch the Building Security In
Maturity Model (BSIMM) online
assessment tool, which companies
can use to gauge how well they're
addressing security in their internal
processes and end products. CTA
also released a white paper outlining
a national strategy to promote IoT
growth, including the challenges of
privacy and security.

Health
Medical device hacking is also a real possibility. So far, these have been confined
to scenarios in TV shows like Homeland,
which killed off a vice president by
reprogramming his pacemaker. Former
Vice President Dick Cheney revealed that
doctors disabled the wireless capability of
18

JANUARY/FEBRUARY 2017

CYBERSECURITY
FORUM AT CES

How can a company manage
risks and mitigate vulnerabilities?
In its second year, the one-day
Cybersecurity Forum at CES 2017,
hosted by CyberVista, a Graham
Holdings Company, "aims to bring
greater cybersecurity literacy to the
consumer technology marketplace
and supply chain on a more holistic
level," says Simone Petrella, chief
cyberstrategy officer, CyberVista.
"Cybersecurity awareness and literacy
needs to start at the top and be part
of a company's culture and strategy
rather than being pushed to the side or
existing in a silo," adds Petrella.

I T I S I N N O VAT I O N

TANG YAU HOONG/GETTY IMAGES

Cybersecurity: The Threat

his heart implant to prevent hacking in a
60 Minutes interview in 2013.
Studies have found that drug
infusion pumps that deliver morphine
drips, chemotherapy and antibiotics
can be remotely manipulated to
change the dosage given to patients.
Bluetooth-enabled defibrillators can
be directed to deliver random shocks
to a patient's heart. X-rays can be
accessed by outsiders lurking on a hospital's network; temperature settings
on refrigerators storing blood and
drugs can be reset, causing spoilage
and digital medical records can be
altered to cause physicians to misdiagnose or prescribe the wrong drugs.
The FDA has issued several alerts
concerning the safety of infusion
pumps developed by Hospira (acquired
by Pfizer). And, Johnson & Johnson
warned users that while the probability
of unauthorized access is low, its Animas
OneTouch Ping insulin pump could be
hacked - with possibly fatal results.
With connected devices expected
to reach 21 billion by 2020, security
and privacy are top priorities. While
IoT holds infinite potential for doing
good - it also presents challenges across
healthcare, payments, transportation,
industrial, government, manufacturing
and M2M. n


http://cescybersecurity.com/

i3 - January/February 2017

Table of Contents for the Digital Edition of i3 - January/February 2017

Contents
i3 - January/February 2017 - Cover1
i3 - January/February 2017 - Cover2
i3 - January/February 2017 - 1
i3 - January/February 2017 - Contents
i3 - January/February 2017 - 3
i3 - January/February 2017 - 4
i3 - January/February 2017 - 5
i3 - January/February 2017 - 6
i3 - January/February 2017 - 7
i3 - January/February 2017 - 8
i3 - January/February 2017 - 9
i3 - January/February 2017 - 10
i3 - January/February 2017 - 11
i3 - January/February 2017 - 12
i3 - January/February 2017 - 13
i3 - January/February 2017 - 14
i3 - January/February 2017 - 15
i3 - January/February 2017 - 16
i3 - January/February 2017 - 17
i3 - January/February 2017 - 18
i3 - January/February 2017 - 19
i3 - January/February 2017 - 20
i3 - January/February 2017 - 21
i3 - January/February 2017 - 22
i3 - January/February 2017 - 23
i3 - January/February 2017 - 24
i3 - January/February 2017 - 25
i3 - January/February 2017 - 26
i3 - January/February 2017 - 27
i3 - January/February 2017 - 28
i3 - January/February 2017 - 29
i3 - January/February 2017 - 30
i3 - January/February 2017 - 31
i3 - January/February 2017 - 32
i3 - January/February 2017 - 33
i3 - January/February 2017 - 34
i3 - January/February 2017 - 35
i3 - January/February 2017 - 36
i3 - January/February 2017 - 37
i3 - January/February 2017 - 38
i3 - January/February 2017 - 39
i3 - January/February 2017 - 40
i3 - January/February 2017 - 41
i3 - January/February 2017 - 42
i3 - January/February 2017 - 43
i3 - January/February 2017 - 44
i3 - January/February 2017 - 45
i3 - January/February 2017 - 46
i3 - January/February 2017 - 47
i3 - January/February 2017 - 48
i3 - January/February 2017 - 49
i3 - January/February 2017 - 50
i3 - January/February 2017 - 51
i3 - January/February 2017 - 52
i3 - January/February 2017 - 53
i3 - January/February 2017 - 54
i3 - January/February 2017 - 55
i3 - January/February 2017 - 56
i3 - January/February 2017 - 57
i3 - January/February 2017 - 58
i3 - January/February 2017 - 59
i3 - January/February 2017 - 60
i3 - January/February 2017 - 61
i3 - January/February 2017 - 62
i3 - January/February 2017 - 63
i3 - January/February 2017 - 64
i3 - January/February 2017 - 65
i3 - January/February 2017 - 66
i3 - January/February 2017 - 67
i3 - January/February 2017 - 68
i3 - January/February 2017 - 69
i3 - January/February 2017 - 70
i3 - January/February 2017 - 71
i3 - January/February 2017 - 72
i3 - January/February 2017 - 73
i3 - January/February 2017 - 74
i3 - January/February 2017 - 75
i3 - January/February 2017 - 76
i3 - January/February 2017 - 77
i3 - January/February 2017 - 78
i3 - January/February 2017 - 79
i3 - January/February 2017 - 80
i3 - January/February 2017 - 81
i3 - January/February 2017 - 82
i3 - January/February 2017 - 83
i3 - January/February 2017 - 84
i3 - January/February 2017 - 85
i3 - January/February 2017 - 86
i3 - January/February 2017 - 87
i3 - January/February 2017 - 88
i3 - January/February 2017 - 89
i3 - January/February 2017 - 90
i3 - January/February 2017 - 91
i3 - January/February 2017 - 92
i3 - January/February 2017 - 93
i3 - January/February 2017 - 94
i3 - January/February 2017 - 95
i3 - January/February 2017 - 96
i3 - January/February 2017 - 97
i3 - January/February 2017 - 98
i3 - January/February 2017 - 99
i3 - January/February 2017 - 100
i3 - January/February 2017 - 101
i3 - January/February 2017 - 102
i3 - January/February 2017 - 103
i3 - January/February 2017 - 104
i3 - January/February 2017 - 105
i3 - January/February 2017 - 106
i3 - January/February 2017 - Cover3
i3 - January/February 2017 - Cover4
https://www.nxtbook.com/nxtbooks/manifest/i3_20210304
https://www.nxtbook.com/nxtbooks/manifest/i3_20210102
https://www.nxtbook.com/nxtbooks/manifest/i3_20201112
https://www.nxtbook.com/nxtbooks/manifest/i3_20200910
https://www.nxtbook.com/nxtbooks/manifest/i3_20200708
https://www.nxtbook.com/nxtbooks/manifest/i3_20200506
https://www.nxtbook.com/nxtbooks/manifest/i3_20200304
https://www.nxtbook.com/nxtbooks/manifest/i3_20200102
https://www.nxtbook.com/nxtbooks/manifest/i3_20191112
https://www.nxtbook.com/nxtbooks/manifest/i3_20190910
https://www.nxtbook.com/nxtbooks/manifest/i3_20190708
https://www.nxtbook.com/nxtbooks/manifest/i3_20190506
https://www.nxtbook.com/nxtbooks/manifest/i3_20190304
https://www.nxtbook.com/nxtbooks/manifest/i3_20190102
https://www.nxtbook.com/nxtbooks/manifest/i3_20181112
https://www.nxtbook.com/nxtbooks/manifest/i3_20180910
https://www.nxtbook.com/nxtbooks/manifest/i3_20180708
https://www.nxtbook.com/nxtbooks/manifest/i3_20180506
https://www.nxtbook.com/nxtbooks/manifest/i3_20180304
https://www.nxtbook.com/nxtbooks/manifest/i3_20180102
https://www.nxtbook.com/nxtbooks/manifest/i3_20171112
https://www.nxtbook.com/nxtbooks/manifest/i3_20170910
https://www.nxtbook.com/nxtbooks/manifest/i3_20170708
https://www.nxtbook.com/nxtbooks/manifest/i3_20160102
https://www.nxtbook.com/nxtbooks/manifest/i3_20160304
https://www.nxtbook.com/nxtbooks/manifest/i3_20160506
https://www.nxtbook.com/nxtbooks/manifest/i3_20160708
https://www.nxtbook.com/nxtbooks/manifest/i3_20170506
https://www.nxtbook.com/nxtbooks/manifest/i3_20170304
https://www.nxtbook.com/nxtbooks/manifest/i3_20170102
https://www.nxtbook.com/nxtbooks/manifest/i3_20161112
https://www.nxtbook.com/nxtbooks/manifest/i3_20160910
https://www.nxtbookmedia.com