Week 3

Internet of Thing devices have become almost ubiquitous in the last few years since they began taking off. Things like smart speakers with microphones built in that can listen for vocal commands to update you on the weather, set timers and alarms, or even integrate with other smart home IoT devices to perform actions like turning lights on and off, closing window blinds and even controlling HVAC systems.

These devices function to make life easier for the occupants of homes with them installed, but one of the seldom discussed challenges that come along with these devices are the vulnerabilities they introduce.

Of course, one of the higher vulnerabilities we talked about in the class comes from these devices not implementing security patches for known/discovered vulnerabilities, but one additional security concern they introduce is being constantly connected to the internet, rather than just a LAN. Since many of these devices advertise being able to control them from anywhere using your mobile device, they often make use of their own proprietary cloud services to accomplish that goal. Because these devices are connected to a cloud service, you’re losing a lot of the control and security you’d gain if it was only locally connected.

This opens the door not only to attackers which may be able to compromise one of the numerous smart home providers out there to gain access to your system/network, but also allows the smart home company full access to your data.

While the latter may not seem like that big of a deal for something like a smart light switch or coffee maker, security cameras and sensors are also IoT devices and their video/sensor data can be accessed from the cloud as well. This not only gives the company a direct feed into your house (if they wanted), any attackers who made their way in could also view this information. This data can then be used to determine when you aren’t home to do other nefarious activities.

There have even been reports of law enforcement contacting these camera companies for video evidence of crimes committed nearby (without a warrant of any kind) and the camera companies handing it over, no questions asked. To make matters worse, (at least for the event I’m referencing) they didn’t discriminate which video footage may be related to the crime and sent over footage from inside an unassuming neighbor’s house.

While the allure of automating and making everything smart is strong, these devices can often introduce vulnerabilities into a system, and it is worth it to do a little research on your device purchase before-hand to consider ones that are local only.

Comments

Popular posts from this blog

Week 5

Week 8