Logo Header Menu

Cyber security for IoT and edge computing 

The internet of things has its own unique cybersecurity considerations, as for cyber security and Edge computing, there are a lot of unknowns Cyber security for IoT and edge computing  image

It’s almost an afterthought. According to Ben Goodman, who is responsible for global corporate business development at ForgeRock, most IoT implementations “prioritise connectivity first.” They look at getting the ‘things’ that make up the IoT talking on a network. Then they look at analytics, then, and only then, they have that sinking feeling — they forgot, they have to worry about cyber security for their IoT projects too. As for edge computing cyber security, Goodman likened it to the Wild West. Meanwhile, for Jake Moore, Cyber security Specialist at ESET, for edge computing and cyber security two-factor authentication methods and password managers are key.”

ForgeRock is in the machine identity business — and with the Internet of Things, that means a lot of identities.  ESET provides technology for cyber security.

To get your IoT cyber security right, “you really have to be secure at multiple levels.  You want to secure the transport of the data, you want to secure access to the data, you want to secure access to things,” says Goodman.

He reckons that the key to this is machine identity — “you need to have a defined unique secure identity for the actual things you’re trying to manage.

“We have this point of view that there’s three phases: there’s an unknown, and the unknown could be a person or a thing; known, that you know who it actually is and trust it,” but there is a middle ground, you know about the device but not sure you can trust it.  So that’s a kind of Donald Rumsfeld approach to IoT cyber security, knowns, known unknowns and unknown unknowns.

He explains further: Many devices out there are just quite frankly unknown.  Then you have some that have a very basic identity but are not necessarily secure, and you can’t validate. And then you have ones that actually do have a secure validated identity, so these you can trust.  Once you can trust something, that really opens up all these additional opportunities.

“One of the fundamental powers of identity management is the capability to understand and model relationships and then use those relationships to make things like access decisions.”

Security is a great concern with IoT deployment, but what about edge security?

Processing IoT data at the edge is a must for businesses. But, both IoT security and edge security are serious concerns for the adopters

Edge computing and cyber security

And that takes us to cyber security and edge computing. What are the issues here?

Edge computing and IoT are not interchangeable, but they do often go hand in hand.

Goodman sees edge computing as a means to an end. Some of these devices that make up the IoT are too low-powered to do some of this work by themselves.  So more and more, you’re seeing the implementation of some type of edge gateway or some type of edge presence which is enabling conversations downstream, or north-south, with these things at the edge.”

Jake Moore says that “edge computing certainly has some benefits, as they don’t need to tackle some traditional security problems such as physical data theft. However, edge is not exempt from other, more common mistakes that put data at risk. Many companies do not take the time to set-up strong unique passwords and keep using default ones.

“Enterprises should invest in two-factor authentication methods and in password managers, particularly for people with higher access levels. This is the fastest way to add an extra layer of security on a bigger scale. It is enough for one set of credentials to be compromised for attackers to penetrate the rest of the system.”

For many observers, edge computing creates a feeling of deja vu. We have seen a swing from PC, meaning local processing, to cloud, and now it’s swinging back to local at least on the edge. And cyber security considerations for edge computing have a sense of deja vu, too.

“I think there’s a zero-trust story,” says Goodman. The truth is, an awful lot of devices can sit on the edge, from smart phones to a container truck or a train. “I think people are going to have to use zero trust concepts where they can’t trust the network, have to authenticate use, and have to understand what data is actually resident there.  And considering the fact that the edge could be very dynamic and always moving, you have to be really open and plan for that as well.”

The five pillars of Edge Computing

Why do we need Edge computing? What is it? What are the advantages? The five pillars to edge computing provide the answers.

The cyber security challenges with edge computing 

With the cloud we have become used to a small number of dominant players. For many organisations this has aided cyber security enormously, they know their cloud provider had cyber security tools in place.

With the edge it is different. Goodman likens it to the Wild West, “almost a no man’s land”, lots of players, no standardisation — although Dell is investing heavily. There’s not a single operating system for the edge, there’s not a single hardware configuration for the edge, there’s not a single network configuration for the edge.

“So to a certain degree, every project is bespoke, so that’s very challenging,” suggests Goodman and for cyber security for edge computing, just like with the Wild West, the door is open — you could say edged open — for pioneers.

Processing IoT data at the edge: the right business decision

In the below Q&A, Rob Milner, head of Connectivity at Cambridge Consultants, explores the importance of processing IoT data at the edge

 

Accessing the benefits of edge computing — a must for industry 4.0

Protecting the edge of IoT as adoption rates for the technology grow

IBM and AT&T continue alliance with cloud, edge and 5G ambition: another game changer?

Data intelligence — is edge analytics the saviour of IoT?

Will 5G access and edge deliver mobile operators a competitive advantage?

Latest news

divider
Diversity
What soft skills are most needed in IT? Toronto Women in IT winners share (part 2)

What soft skills are most needed in IT? Toronto Women in IT winners share (part 2)

13 December 2019 / 7. Communication and the ability to be agile Entrepreneur of the Year Sue Britton, CEO [...]

divider
Diversity
What soft skills are most needed in IT? Toronto Women in IT winners share

What soft skills are most needed in IT? Toronto Women in IT winners share

13 December 2019 / Given the competitiveness of today’s IT talent market, you may think a job candidate who [...]

divider
Cybersecurity
Predictions for cyber security in 2020

Predictions for cyber security in 2020

13 December 2019 / As cyber attacks continue to rise, which sectors and system areas are at the most [...]

divider
Releases & Updates
Informatica updates its data management capabilities

Informatica updates its data management capabilities

12 December 2019 / The five launched updates will enhance solutions across Informatica‘s portfolio, which offers smart data management [...]

divider
Data Protection & Privacy
India proposes first major data protection law, but at what cost?

India proposes first major data protection law, but at what cost?

12 December 2019 / India has proposed its first major data protection law and it has brought some controversy. [...]

divider
Data Protection & Privacy
Predictions for data usage and regulation in 2020

Predictions for data usage and regulation in 2020

12 December 2019 / How will data regulation affect the tech landscape within the next year, and how may [...]

divider
Releases & Updates
IFS acquire Astea International to expand footprint

IFS acquire Astea International to expand footprint

11 December 2019 / The acquisition, which was initially announced in October, will see both companies’ footprint grow within [...]

divider
Releases & Updates
LGfL rolls out supercharge bandwidth to schools for Pledge 2020

LGfL rolls out supercharge bandwidth to schools for Pledge 2020

11 December 2019 / The project is estimated to increase bandwidth for the charity’s 3000 member schools by 200%. [...]

divider
Business & Strategy
Gartner’s top 10 infrastructure and operations trends for 2020

Gartner’s top 10 infrastructure and operations trends for 2020

11 December 2019 / “This past year, infrastructure trends focused on how technologies like artificial intelligence (AI) or edge [...]

Do NOT follow this link or you will be banned from the site!

Pin It on Pinterest