She received an alert from credit
card Company of a debit of $50 from the neighborhood grocery store. She
panicked and then remembered that it was probably the refrigerator ordering
replenishments (My
refrigerator has gone shopping). She was however worried about what did it
end up ordering. Having finished the orange juice from the last purchase and
not wanting anymore, nor the horrible cake that came as an offer last time (She
was anyway trying to lose weight). She then received the e-bill on mail and was
shocked to see sausages and beef steak ! These did not exist in the master list
and decided to visit the store on the way back to find out what had gone wrong.
Recently I was at a cybersecurity conference in the country which boasts
of the maximum number of IT security startups and companies. They continue to
redefine information and cyber security in ways that most of us would find hard
to imagine. The new and old are not focusing just to make better antivirus or
firewalls or mobile device management solutions; their R&D has transcended
conventional boundaries. With Internet of (Every)Things and all kinds of
devices communicating with again all kind of devices, the channels need to be
secured.
The use cases discussed sounded straight out of science fiction or
futuristic movies except that all were stark reality which we are rarely
exposed to. The innocuous IP audio-conferencing phone in the meeting room as a
listening device or the video conferencing equipment transmitting images or
streaming live unknown to everyone. Directional antenna sniffing the airwaves
and breaking wireless networks or RFID tags or readers in a manufacturing
facility misbehaving and making a mess of the inventory and production plan.
At our homes the number of connected devices is increasing; for me it
started with my streaming media box, then the television followed by the gaming
console which was fighting with multiple tablet and laptop computers. My new
car wants to send messages to the service station when it felt sick and my GPS
has a mind of its own routing me through lesser known roads in a quest to get
me to my destination faster and screwing up. When I have not finished my daily
dose of walking my fitness ban posts on social media embarrassing me.
It is not a stretch of imagination to believe that these devices can be
infected with malicious code which may change behavior or purpose. Individuals unknowingly
changing their daily pattern or nudged in an alternate direction by compromised
devices can impact their professional actions and outcomes. Why do you need to
break into a trading system, break the trader, it’s easier ! Shutting down an
electrical grid is big effort, shut down people or change them; use sensors to
hack into the system. I was stunned by the possibilities.
In the future with every device connected and transmitting or receiving
information, intelligence is corruptible and creates new scenarios of what can
go wrong. Recent demonstrations though not malicious in intent of some highly
computerized cars being hijacked predict an unstable future. The ability to
patch or secure the large number of devices (estimated at 20 billion plus),
company provided or individual owned BYOD enabled will be a veritable nightmare
for the enterprise security managers and CIOs.
Enterprises are pushing to create new opportunities that become possible
with IoT; some of these maybe seeded with hare brained ideas though I believe
many will survive and become the next big thing of tomorrow. I believe that
everyone needs to be cognizant of the fact that IoT is here to stay; how we
leverage it within our ecosystem will give a differentiated advantage that
success stories are made of. Every new hyped technology falls through the
trough of disillusionment before becoming mainstream. Stay invested.
She reached the store and
challenged them demanding a refund and the fact that they had goofed up
majorly. In return they showed her the order which did contain specific brand
of sausages and steak. She called the refrigerator company who informed her
that the last software upgrade had added social media features and her refrigerator
had accepted a request from the specified company to receive promotions. The
conversion of the promotion to order was probably a bug which they will
investigate and patch the firmware.
I wonder if a virus were to infect the refrigerator, what would it do ?