• About
  • Privacy & Policy
  • Contact
Thursday, July 7, 2022
MYTECHMAG-A Leading Technology Magazine
  • Exhivits The Virtual Exhibition Top Banner
  • 11th NFP Top-banner
  • Cyber Defense Top Banner
  • 2nd FIF Top Banner
  • 12th NFP Top Banner
  • OGAD Top Banner
  • Home
  • Technology
    • Supply Chain
    • Enterprise Security
    • Cloud Technology
    • RegTech
    • HPC
    • Collaboration
    • IoT
    • Compliance
    • Artificial Intelligence
    • Field Service
    • CRM
    • Project Management
    • Fintech
    • Risk Management
    • Cyber Security
    • Enterprise Architecture
    • EAM
    • ECM
    • Block Chain
    • Data Analytics
    • Robotics
    • Disaster Recovery
    • Marketing
    • Workflow Management
  • Industry
    • Retail
    • Healthcare
    • Construction
    • Pharma
    • Education
    • Textile
    • Aerospace and Defense
    • Banking
    • Smart City
    • Oil and Gas
    • Telecom
    • Travel & Hospitality
    • Agri Tech
    • Media & Entertainment
    • Logistics
    • Manufacturing
    • Legal
    • Government
    • Real Estate
    • Automotive
    • Food and Beverage
    • Biotech
    • HR
    • Insurance
    • Energy and Utilities
    • Contact Center
    • Capital Market
    • Chemical
    • Sports
  • Solution Providers
    • Aerospace and Defense
    • Agri Tech
    • Artificial Intelligence
    • Automotive
    • Banking
    • Capital Market
    • Cloud Technology
    • Collaboration
    • Construction
    • Contact Center
    • CRM
    • Cyber Security
    • Data Analytics
    • Disaster Recovery
    • EAM
    • ECM
    • Energy and Utilities
    • Enterprise Architecture
    • Enterprise Security
    • Fintech
    • Government
    • Healthcare
    • HR
    • Insurance
    • IOT
    • Legal
    • Logistics
    • Manufacturing
    • Marketing
    • Oil and Gas
    • Pharma
    • Retail
    • Risk Management
    • Smart City
    • Supply Chain
    • Top CEOs
  • Magazines EditionsWhat's New
  • News & PR
    • News
    • Press Release
  • CXO Thoughts
  • Featured Articles
  • Top CEOs
  • Events
No Result
View All Result
  • Home
  • Technology
    • Supply Chain
    • Enterprise Security
    • Cloud Technology
    • RegTech
    • HPC
    • Collaboration
    • IoT
    • Compliance
    • Artificial Intelligence
    • Field Service
    • CRM
    • Project Management
    • Fintech
    • Risk Management
    • Cyber Security
    • Enterprise Architecture
    • EAM
    • ECM
    • Block Chain
    • Data Analytics
    • Robotics
    • Disaster Recovery
    • Marketing
    • Workflow Management
  • Industry
    • Retail
    • Healthcare
    • Construction
    • Pharma
    • Education
    • Textile
    • Aerospace and Defense
    • Banking
    • Smart City
    • Oil and Gas
    • Telecom
    • Travel & Hospitality
    • Agri Tech
    • Media & Entertainment
    • Logistics
    • Manufacturing
    • Legal
    • Government
    • Real Estate
    • Automotive
    • Food and Beverage
    • Biotech
    • HR
    • Insurance
    • Energy and Utilities
    • Contact Center
    • Capital Market
    • Chemical
    • Sports
  • Solution Providers
    • Aerospace and Defense
    • Agri Tech
    • Artificial Intelligence
    • Automotive
    • Banking
    • Capital Market
    • Cloud Technology
    • Collaboration
    • Construction
    • Contact Center
    • CRM
    • Cyber Security
    • Data Analytics
    • Disaster Recovery
    • EAM
    • ECM
    • Energy and Utilities
    • Enterprise Architecture
    • Enterprise Security
    • Fintech
    • Government
    • Healthcare
    • HR
    • Insurance
    • IOT
    • Legal
    • Logistics
    • Manufacturing
    • Marketing
    • Oil and Gas
    • Pharma
    • Retail
    • Risk Management
    • Smart City
    • Supply Chain
    • Top CEOs
  • Magazines EditionsWhat's New
  • News & PR
    • News
    • Press Release
  • CXO Thoughts
  • Featured Articles
  • Top CEOs
  • Events
No Result
View All Result
MYTECHMAG-A Leading Technology Magazine
No Result
View All Result
Home News

How AI can assist in Identifying IoT (Internet of Things) Vulnerabilities

Michael Stewart by Michael Stewart
December 22, 2020
in News
18
SHARES
71
VIEWS

The IoT (Internet of Things) solutions have been accepted by the companies in every industry to a large extent and very rapidly. But this IoT tech does not have even reached its maturity.

This rapid acceptance of IoT technologies by manufacturers and other users led to the non-consideration of the whole security aspect in their strategy.

When you talk about the security aspect of IoT it is not only about the protection of the data but also to consider and address the inherent vulnerabilities of many IoT devices.

Now for example, if someone using a smart speaker or appliance or a wireless security camera with a default username and password or if the device is using a weak protocol for authentication, a hacker or intruder can very easily access and can use it as a gateway to the place.

Whereas, if we see in the case of infusion pumps or any other medical devices, the focus is mainly on the primary function of the device and not even considering a point of the security aspect. The devices in-home or office are often based on inexpensive and lightweight security protection, i.e., not as robust as enterprise security.

Deepak Kumar at 28th USENIX Security Symposium, 2019 represented a large scale analysis on 83 million IoT devices in 16 million homes globally in “All things considered: An Analysis of IoT Devices on Home Networks”.

This analysis showed that some devices such as home appliances, game consoles, surveillance, wearable, Voice assistants and other devices showed serious security concerns. However, some devices also used weak authentication protocols such as weak passwords or default administrative credentials that were not even changed by the users.

The new approach towards the security concerns of the devices should be employed to see the vulnerability. The new laws are being introduced by regional and international governments globally to mitigate these security concerns.

The AI (Artificial Intelligence) and ML (Machine Learning) also enable us to predict any threat.

California has introduced a new SB-327 law which states that manufacturers have to eliminate default passwords from devices.

The United Kingdom has also developed a certification scheme to label the compliant devices with a tag “Secure by Design Standard”, this tag has become a competitive differentiator to better the brand security of manufacturers.

In the IoT space, AI (Artificial Intelligence) and ML (Machine Learning) can help very much in recognising vulnerabilities before they can be exploited.

Michael Stewart
Share1Tweet5Share7
Previous Post

Payment & Card Edition Dec 2020

Next Post

7 Promising Energy Startups to Watch in 2021

Related Posts

News

Unleash Innovation. Transform Results.

June 9, 2022
Football Stadium Dracut MA Dynamic Effects
News

Sports and Entertainment Venues Win Big with Synapse Wireless Sports Lighting Solution Release Remote Access, Customized Control, and Dynamic Effects

June 1, 2022
News

Automation In Construction Unlocks New Value For Businesses

May 12, 2022
Next Post
7 Promising Energy Startups to Watch in 2021

7 Promising Energy Startups to Watch in 2021

  • OGAD Banner
  • Exhivits The Virtual Exhibition Side Banner
  • 11th NFP Side-Banner
  • Cyber Defense Side Banner
  • 2nd FIF side banner
  • 12th NFP Side Banner
Tweets by MyTechMag
  • Exhivits The Virtual Exhibition Side Banner
  • 2nd FIF side banner
  • OGAD Banner
  • Cyber Defense Side Banner
  • 11th NFP Side-Banner
  • 12th NFP Side Banner
MYTECHMAG

Transforming news into insights, not only do we serve as a source of information but as the breeding ground for innovative ideas and exchange of breathtaking strategizes that can make a difference in your technological understanding.

Follow Us

  • Home
  • About Us
  • Disclaimer
  • Privacy Policy
  • Terms of Use
  • Sitemap
  • News
  • Subscribe
  • Contact Us
  • RSS
  • Write For Us

Recent Posts

Document Management Workflow

How Document Management Workflow Assists Organizations

July 6, 2022
Cloud Workflow Application

What Is The Purpose Of A Cloud Workflow Application?

July 6, 2022
  • About
  • Privacy & Policy
  • Contact

© Copyright © 2022 MYTECHMAG. All Right Reserved.

No Result
View All Result
  • Home
  • Technology
  • Industry
  • Solution Providers
  • Magazines Editions
  • News & PR
    • News
    • Press Release
  • CXO Thoughts
  • Featured Articles
  • Top CEOs
  • Events

© Copyright © 2022 MYTECHMAG. All Right Reserved.

Company Of The Month

Infoclutch Inc

Explore Untapped Market With Pristine B2B Data