Myths Debunked About Security And Privacy Of IOT


Myth #2: Existing IT security and privacy concepts and practices are sufficient to meet IoT challenges.

For efficiency purpose, innumerable IoT devices and systems are connected. It is important to become exponentially more efficient in dealing the matters related to privacy and security of this Iot network. At the IEEE Summit on Internet Governance Vint Cerf, a “father of the Internet” and chief Internet evangelist at Google, reviewed why he and his colleagues settled on 32-bit Internet Protocol (IP) addresses for the Internet. In a back-of-the-envelope calculation, they found that 2 billion to 4 billion IP addresses eventually needed and 32-bit addresses seemed more than required. In future, it is expected that every person will have hundreds or thousands of associated IP-addressed objects. The more in quantity, the more complicated it is.

Myth #3: Cyber security today is a well-established, mature science that addresses most IoT concerns.

Cyber domain depends on good – or poor – security and privacy decisions. It is important because humans are involved in every step of design, implementation, operation, deployment, maintenance, and use and decommissioning. But human behavior is not closed like maths. Example- Encryption has a nice, neat, closed form, in terms of how it describes a problem and provides a solution. Science is a solution to closed systems but not for nature free human interactions. Hence science cannot really contribute to every step of design, implementation, operation, deployment, maintenance, and use and decommissioning. This makes the security and privacy decisions weak in the system.

Read Also: Ways to Manage And Sync Multiple Devices

Know Who Can Access Your Facebook Account Without Password