IoT Then and Now

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
or

Already have an account? Sign In »

Time
8 hours 10 minutes
Difficulty
Advanced
CEU/CPE
8
Video Transcription
00:00
Hi, I'm Matthew Clark. This is less than 1.2 I o t. Then. And now
00:08
in this lesson, we will take a step back in time and discuss coyote predictions from the year 2014.
00:15
Then we will quickly fast forward to the present and see if those predictions came true.
00:20
We're going to focus on I O. T s current state, and we'll look at some statistics to get a feel for what's going on, and we're gonna investigate different uses and applications of I o. T. Finally, we're going to take a look at the challenges that Coyote still has to overcome. So let's get started.
00:36
So let's take a ride in our time machines back to 2014 July 2014. And it is. Jason Bloomberg just wrote an article in wired dot com entitled Seven Reasons Why the Internet of Things Is Doomed.
00:50
And these were his reasons first, security and privacy,
00:54
which he correctly pointed out where two different things.
00:57
He was worried because in 2014, our best efforts to secure i o. T. Still allowed script kitties, toe hack baby monitors and laptop cameras.
01:07
He was concerned about the digital fatigue would consumers get tired of just another device?
01:12
He cited the lack of open standards and i o T ecosystems as a stumbling block that might prevent devices from talking to one another.
01:23
He also lamented the fact that there was no killer app to draw consumers in like a refrigerator that orders milk when it's out.
01:30
He predicted that enterprises just might mess things up because of all of their legacy devices, and those legacy devices would turn their digital transformation dreams into nightmares.
01:44
Lastly, he predicted that vendors would use i o. T. To improperly influence consumers by collecting way too much information about them. Sound familiar?
01:55
He did conclude the article by stating that he was overall an optimist. Not everything was gloom and doom, and I think that's an important lesson for us to take away as we look at the current state of I o. T. His core prediction was that I ot would struggle, but that it would eventually find its way
02:13
just maybe not in the form that people envisioned back in 2014, where the refrigerator contacted the supermarket and ordered orange juice when it was out.
02:23
So the question is, did Jason totally missed the boat on this one. Well, let's fast forward and find out.
02:30
So has I o. T improved since 2014? Well, look no further than the news for an answer. As you can see, there are many stories that fill the headlines. Alexa units hacking microwaves, hackers attacking thermostats and turning smart homes into Sana's cars being hacked,
02:49
which is a great story. But for another time.
02:52
My favorite article is the one about the Children's doll that is spying on your family.
02:57
We'll talk about that one a little later on.
02:59
But maybe these air just sensational headlines. So let's try to dig a little deeper to see what the true picture is.
03:07
A March 2020 Coyote Threat report by Palo Alto found that 98% of all I o T traffic was an encrypted,
03:16
and 57% of I O T devices are vulnerable to medium and high severity attacks.
03:23
This report goes on to list many other security and privacy issues found in I O. T. In the five years since Jason's predictions.
03:34
So from 2014 to now, how can we summarize our progress?
03:38
Well, if we look at things with a critical lie. Maybe all we would see is a disgraceful pile of problems, authentication and authorization issues, insecure communications bought net and ransomware attacks and privacy issues.
03:53
But let's try to add some perspective. Let's see how big of a deal this actually is.
04:01
According to statistical dot com, there were 26 billion I O T devices in 2019. That's a lot of devices
04:11
just for reference. There is only 7.8 billion people in the world
04:16
now. Every 2nd, 127 new I O T devices are connected to the Internet being generous. This lessons about nine minutes long.
04:26
So while you watch this, 68,500 new devices were connected to the Internet.
04:33
84% of companies which have adopted I ot have also unfortunately reported an I. O. T. Security breach. That's a lot of breaches,
04:44
so let's continue to dig a little deeper.
04:47
Was Jason Bloomberg right to be concerned about I ot struggling before eventually becoming adopted? Well, what did the numbers say?
04:56
We see that by 2030 the 26 billion devices grow to a whopping 125 billion. Just think of how many devices will be connecting every second in 2030.
05:12
Another way to determine how I o. T. Is doing is to look at the industries that are heavily invested in it.
05:17
Is it just consumer use that is driving these growth numbers?
05:21
Well, when we look at the growth of I o. T. By industry, we see that the industrial I o t. Smart cities and health care are highly invested in I O. T. As well as other industries.
05:33
So this does appear that Coyote is a big deal.
05:40
Well, that should be surprising. Let's take a little deeper look into these uses by industry
05:45
consumer I o. T is certainly driving coyote adoption. No doubt about that. Users like they're smart light bulbs, refrigerators and smart cars.
05:55
Industrial I O. T is also driving a lot of I o. T. Demand. Smart agriculture, industrial control systems and operational technology also topped the list.
06:04
Smart cities with this critical services and medical i o. T.
06:09
With pacemakers, insulin pumps and thermometers. The applications of I o. T are limitless.
06:15
I o t is everywhere.
06:16
Let's try to summarize the challenges that we face
06:20
they're very use cases, and we just went through some of the industry's.
06:25
But every I o T device can have a incredibly different lifetime.
06:29
For example, consumer devices are expected to last a few years, whereas industrial devices are expected to last 10 to even 20 years.
06:38
I o t device constraints and limited resource is, or another challenge to overcome
06:44
coyote devices Air considered to be always connected
06:46
i O T devices do have a hostile perimeter. The installation place can vary greatly
06:53
i o T devices to be installed in consumer homes or places of work. Or they could be embedded in cement on top of a high rise building.
07:00
I O. T devices have maintenance challenges as well. How do you update a device in a factory that runs 24 hours a day, seven days a week?
07:10
Lastly, security seems to be bolted on, especially in the consumer area.
07:15
Many times, security appears to be nothing more than an afterthought.
07:20
It's important to remember that there are a lot of security professionals that air dedicated to turning these statistics and problems around.
07:29
I think that's the reason why we're seeing the industry's adopting I o t even before all of Jason Bloomberg's predictions fully come true.
07:38
Let's not pick too hard on Jason. He did a wonderful job, and he was generally pretty much correct in all of his assumptions.
07:45
I think the strongest point of Jason's article wasn't all the gloom and doom, but the positive outlook he had for the future.
07:51
My experience is when I keep a proper perspective of things, I can generally deal better in the short term negatives because I know that I'm working to overcome them.
08:01
So with that in mind, I'm gonna leave with you at the challenge. When you learn something new in this course, always ask yourself, How can I use what I've learned to help solve a specific problem today?
08:13
And that's all for this lesson
08:16
in this lesson, we ask ourselves, is I o. T doomed to fail.
08:20
We looked at I o. T in the news and determined that no, I was changed since 2014.
08:26
We also spent some time looking at statistics and decided that based Sicilian statistics we were on a train to nowhere. We drank a glass of water and calm down and discussed coyote without getting all hysterical. And finally we accepted a challenge. We asked ourselves, What can we do to help?
08:45
I'll see you next time.
Up Next
IoT Product Security

This course will focus on the fundamentals of how to set up a functioning IoT product security program from the perspective of a company that designs, manufactures, and sells IoT and IIoT devices for consumer or industrial use.

Instructed By