i3 - September/October 2019 - 21

s e c u r i t y
recommendations" have raised more questions "about
where to start, how to consider such a wealth of overlapping recommendations, and which ones to follow."
That's why there is "a need for a common baseline of security capabilities for all IoT devices" to assure "efficiencies of
scale in development, manufacturing, support, training,
assessment and identification of IoT products with increased
security controls, according to the C2 report.
Mike Bergman, VP of technology & standards, CTA, who
has also headed the C2 project, points to how such cooperation is taking shape. "We're all working in the same direction
with the same goal of baseline security," Bergman explains.
"We're coordinating to assure more alignment" as NIST develops the federal capabilities. "We want to understand if there
might be any differences. These two efforts are quite parallel
and should support each other in their appropriate sectors."
The report explains, "botnets" are at the heart of the cybersecurity defense campaign. Software invaders can "propagate
malware, conduct denial of service attacks and spread disinformation on social media." It cites botnet attacks that include
"more than 30 million 'zombie' endpoints."

IOT AND INSECURITY

Finding successful protections that make finanancial sense
and meet public policy objectives are at the heart of the cybersecurity projects. Among the challenges are finding costeffective ways to assure security in low-cost sensors and

v i a

i3_0919_FEATURE_Cybersecurity.indd 21

11 0 1 0 111 11 0 1 0 111 11 0 1 0 111 11 0 1 0 111 11 0 1 0 111 11 0 1 0 111 11 0 1 0 11

a l i g n m e n t

ensuring that protective systems meet privacy criteria. The
report notes the deluge of IoT devices that "introduce new
concerns regarding the safety, reliability, security, resilience
and privacy of the device, leading to potential reduction in
the overall trustworthiness of the system."
The C2 initiative, which was coordiated by the Council
to Secure the Digital Economy and CTA, includes groups
such as the Association of Home Appliance Manufacturers,
Cable Television Laboratories Inc., CTIA, the Internet of
Secure Things, Underwriters Laboratories Inc., the U.S.
Chamber of Commerce and the United States Telecom
Association. Bergman explains that each of these industry
groups convenes their own membership and security
experts, so the C2 effort-"convene the conveners"-is
leveraging expertise far and wide.
Bergman points out that the C2 white paper is one step
toward a formal technical standard. CTA is developing a
cybersecurity standard designated as "ANSI/CTA-2088,"
which is expected to be ready by year's end. Among the goals
of that document is creation of a national standard that can
be adopted by manufacturers, retailers and others - thus
establishing a single, unified benchmark before state or
regional standards muddle the security barriers.
Matthew Eggers, VP of cybersecurity policy, national security and emergency preparedness at the U.S. Chamber of
Commerce, explains that developing a cybersecurity baseline
is vital, not just for companies but also to help

c o l l a b o r a t i o n

9/9/19 7:04 PM



i3 - September/October 2019

Table of Contents for the Digital Edition of i3 - September/October 2019

Contents
i3 - September/October 2019 - Cover1
i3 - September/October 2019 - Cover2
i3 - September/October 2019 - Contents
i3 - September/October 2019 - 2
i3 - September/October 2019 - 3
i3 - September/October 2019 - 4
i3 - September/October 2019 - 5
i3 - September/October 2019 - 6
i3 - September/October 2019 - 7
i3 - September/October 2019 - 8
i3 - September/October 2019 - 9
i3 - September/October 2019 - 10
i3 - September/October 2019 - 11
i3 - September/October 2019 - 12
i3 - September/October 2019 - 13
i3 - September/October 2019 - 14
i3 - September/October 2019 - 15
i3 - September/October 2019 - 16
i3 - September/October 2019 - 17
i3 - September/October 2019 - 18
i3 - September/October 2019 - 19
i3 - September/October 2019 - 20
i3 - September/October 2019 - 21
i3 - September/October 2019 - 22
i3 - September/October 2019 - 23
i3 - September/October 2019 - 24
i3 - September/October 2019 - 25
i3 - September/October 2019 - 26
i3 - September/October 2019 - 27
i3 - September/October 2019 - 28
i3 - September/October 2019 - 29
i3 - September/October 2019 - 30
i3 - September/October 2019 - 31
i3 - September/October 2019 - 32
i3 - September/October 2019 - 33
i3 - September/October 2019 - 34
i3 - September/October 2019 - 35
i3 - September/October 2019 - 36
i3 - September/October 2019 - 37
i3 - September/October 2019 - 38
i3 - September/October 2019 - 39
i3 - September/October 2019 - 40
i3 - September/October 2019 - 41
i3 - September/October 2019 - 42
i3 - September/October 2019 - 43
i3 - September/October 2019 - 44
i3 - September/October 2019 - 45
i3 - September/October 2019 - 46
i3 - September/October 2019 - 47
i3 - September/October 2019 - 48
i3 - September/October 2019 - 49
i3 - September/October 2019 - 50
i3 - September/October 2019 - 51
i3 - September/October 2019 - 52
i3 - September/October 2019 - 53
i3 - September/October 2019 - 54
i3 - September/October 2019 - 55
i3 - September/October 2019 - 56
i3 - September/October 2019 - Cover3
i3 - September/October 2019 - Cover4
https://www.nxtbook.com/nxtbooks/manifest/i3_20210102
https://www.nxtbook.com/nxtbooks/manifest/i3_20201112
https://www.nxtbook.com/nxtbooks/manifest/i3_20200910
https://www.nxtbook.com/nxtbooks/manifest/i3_20200708
https://www.nxtbook.com/nxtbooks/manifest/i3_20200506
https://www.nxtbook.com/nxtbooks/manifest/i3_20200304
https://www.nxtbook.com/nxtbooks/manifest/i3_20200102
https://www.nxtbook.com/nxtbooks/manifest/i3_20191112
https://www.nxtbook.com/nxtbooks/manifest/i3_20190910
https://www.nxtbook.com/nxtbooks/manifest/i3_20190708
https://www.nxtbook.com/nxtbooks/manifest/i3_20190506
https://www.nxtbook.com/nxtbooks/manifest/i3_20190304
https://www.nxtbook.com/nxtbooks/manifest/i3_20190102
https://www.nxtbook.com/nxtbooks/manifest/i3_20181112
https://www.nxtbook.com/nxtbooks/manifest/i3_20180910
https://www.nxtbook.com/nxtbooks/manifest/i3_20180708
https://www.nxtbook.com/nxtbooks/manifest/i3_20180506
https://www.nxtbook.com/nxtbooks/manifest/i3_20180304
https://www.nxtbook.com/nxtbooks/manifest/i3_20180102
https://www.nxtbook.com/nxtbooks/manifest/i3_20171112
https://www.nxtbook.com/nxtbooks/manifest/i3_20170910
https://www.nxtbook.com/nxtbooks/manifest/i3_20170708
https://www.nxtbook.com/nxtbooks/manifest/i3_20160102
https://www.nxtbook.com/nxtbooks/manifest/i3_20160304
https://www.nxtbook.com/nxtbooks/manifest/i3_20160506
https://www.nxtbook.com/nxtbooks/manifest/i3_20160708
https://www.nxtbook.com/nxtbooks/manifest/i3_20170506
https://www.nxtbook.com/nxtbooks/manifest/i3_20170304
https://www.nxtbook.com/nxtbooks/manifest/i3_20170102
https://www.nxtbook.com/nxtbooks/manifest/i3_20161112
https://www.nxtbook.com/nxtbooks/manifest/i3_20160910
https://www.nxtbookmedia.com