IDEAS home Printed from https://ideas.repec.org/a/aza/csj000/y2017v1i1p6-15.html
   My bibliography  Save this article

A security evolution driven by the Internet of Intelligent Things

Author

Listed:
  • Williamson, Steve P.

Abstract

The technological evolution characterised by Social, Mobile, Analytics and Cloud (SMAC) brings transformational benefits for consumers at the expense of increased risk. The risk is not limited to data breach, initiated by cybercriminals. The Internet of Things (IoT) refers to devices with processing capability and internet connectivity. These things have a broad range of uses and may control hardware, such as industrial machinery, vehicles and medical devices. Malfunctions caused by software defects, malware attacks or misuse are potential causes of catastrophic events. This paper argues that information security controls, processes and capabilities need to evolve in order to address the risks that arise in this distributed digital landscape. Commonly accepted best practices, such as secure software development, privileged access control and security configurations are still critical mitigations. They are difficult to implement in the Internet of Things marketplace, however, which is characterised by rapid product development, limited regulation and uninformed consumers. In security terms, we need to defend a rapidly expanding attack surface against an increased range of threats. Loss of system availability or compromised data integrity could have catastrophic consequences for self-driving cars or in the dispensing of medication. When assessing risk, security systems provide necessary but insufficient mitigation. This paper will argue for a multidisciplined approach to risk management, requiring a greater convergence between the disciplines of both software quality and information security. This is especially necessary within the software development life cycle.

Suggested Citation

  • Williamson, Steve P., 2017. "A security evolution driven by the Internet of Intelligent Things," Cyber Security: A Peer-Reviewed Journal, Henry Stewart Publications, vol. 1(1), pages 6-15, June.
  • Handle: RePEc:aza:csj000:y:2017:v:1:i:1:p:6-15
    as

    Download full text from publisher

    File URL: https://hstalks.com/article/4421/download/
    Download Restriction: Requires a paid subscription for full access.

    File URL: https://hstalks.com/article/4421/
    Download Restriction: Requires a paid subscription for full access.
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    More about this item

    Keywords

    IoT; AI; risk; secure development; safety; Internet of Things;
    All these keywords.

    JEL classification:

    • M15 - Business Administration and Business Economics; Marketing; Accounting; Personnel Economics - - Business Administration - - - IT Management

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:aza:csj000:y:2017:v:1:i:1:p:6-15. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Henry Stewart Talks (email available below). General contact details of provider: .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.