Skip to main content

You are here

THE FIELD GUIDE TO IOT SECURITY

 

You must be logged in to view and download documents.

You must be logged in to view and download documents.

  • Government employees:  If you have an account, log in by clicking on login button at top of page.  If you don’t have an account, click here to create your free account.
  • Industry employees:
    • If your company is an IAC member and you have an account, log in by clicking on login button at top of page.
    • If your company is an IAC member and you don't have an account, click here to create an account.
    • If your company is not an IAC member, contact April Davis for information about membership (adavis@actiac.org or 703-208-4800 ext. 202).
 

Abstract

Booz Allen Hamilton

As a society, we’re rushing into the Internet of Things (IoT) at a breakneck pace, applying it to anything and everything we can think of – cars, planes, and trains, pacemakers, light bulbs, baby monitors, homes, offices, factories, nuclear power plants, electric grids, even children’s dolls. If something can be connected, we’re connecting it.

The only trouble is, we’re moving to IoT faster than our ability to secure it. And IoT is not like traditional IT. It’s far more vulnerable to attack. If cyberattackers get control of one of your systems, they can do far more than steal emails and credit card numbers. They can make the “things” in the Internet of Things go wrong. Pick something in IoT, and then imagine what would happen if foreign countries, cybercriminals– or just hackers looking for attention – had their way with it.

Document Date: 
Mar 3, 2017
 
Author (organization): 
Booz Allen Hamilton
 
Document type: 
ACT-IAC Report
 
Interests: 
Igniting Innovation Conference