https://urgentcomm.com/wp-content/themes/ucm_child/assets/images/logo/footer-new-logo.png
  • Home
  • News
  • Multimedia
    • Back
    • Multimedia
    • Video
    • Podcasts
    • Galleries
    • IWCE’s Video Showcase
    • Product Guides
  • Commentary
    • Back
    • Commentary
    • Urgent Matters
    • View From The Top
    • All Things IWCE
    • Legal Matters
  • Resources
    • Back
    • Resources
    • Webinars
    • White Papers
    • Reprints & Reuse
  • IWCE
    • Back
    • IWCE
    • Conference
    • Special Events
    • Exhibitor Listings
    • Premier Partners
    • Floor Plan
    • Exhibiting Information
    • Register for IWCE
  • About Us
    • Back
    • About Us
    • Contact Us
    • Advertise
    • Terms of Service
    • Privacy Statement
    • Cookie Policy
  • Related Sites
    • Back
    • American City & County
    • IWCE
    • Light Reading
    • IOT World Today
    • Mission Critical Technologies
    • TU-Auto
  • In the field
    • Back
    • In the field
    • Broadband Push-to-X
    • Internet of Things
    • Project 25
    • Public-Safety Broadband/FirstNet
    • Virtual/Augmented Reality
    • Land Mobile Radio
    • Long Term Evolution (LTE)
    • Applications
    • Drones/Robots
    • IoT/Smart X
    • Software
    • Subscriber Devices
    • Video
  • Call Center/Command
    • Back
    • Call Center/Command
    • Artificial Intelligence
    • NG911
    • Alerting Systems
    • Analytics
    • Dispatch/Call-taking
    • Incident Command/Situational Awareness
    • Tracking, Monitoring & Control
  • Network Tech
    • Back
    • Network Tech
    • Interoperability
    • LMR 100
    • LMR 200
    • Backhaul
    • Deployables
    • Power
    • Tower & Site
    • Wireless Networks
    • Coverage/Interference
    • Security
    • System Design
    • System Installation
    • System Operation
    • Test & Measurement
  • Operations
    • Back
    • Operations
    • Critical Infrastructure
    • Enterprise
    • Federal Government/Military
    • Public Safety
    • State & Local Government
    • Training
  • Regulations
    • Back
    • Regulations
    • Narrowbanding
    • T-Band
    • Rebanding
    • TV White Spaces
    • None
    • Funding
    • Policy
    • Regional Coordination
    • Standards
  • Organizations
    • Back
    • Organizations
    • AASHTO
    • APCO
    • DHS
    • DMR Association
    • ETA
    • EWA
    • FCC
    • IWCE
    • NASEMSO
    • NATE
    • NXDN Forum
    • NENA
    • NIST/PSCR
    • NPSTC
    • NTIA/FirstNet
    • P25 TIG
    • TETRA + CCA
    • UTC
Urgent Communications
  • NEWSLETTER
  • Home
  • News
  • Multimedia
    • Back
    • Video
    • Podcasts
    • Omdia Crit Comms Circle Podcast
    • Galleries
    • IWCE’s Video Showcase
    • Product Guides
  • Commentary
    • Back
    • All Things IWCE
    • Urgent Matters
    • View From The Top
    • Legal Matters
  • Resources
    • Back
    • Webinars
    • White Papers
    • Reprints & Reuse
    • UC eZines
    • Sponsored content
  • IWCE
    • Back
    • Conference
    • Why Attend
    • Exhibitor Listing
    • Floor Plan
    • Exhibiting Information
    • Join the Event Mailing List
  • About Us
    • Back
    • About Us
    • Contact Us
    • Advertise
    • Cookie Policy
    • Terms of Service
    • Privacy Statement
  • Related Sites
    • Back
    • American City & County
    • IWCE
    • Light Reading
    • IOT World Today
    • TU-Auto
  • newsletter
  • In the field
    • Back
    • Internet of Things
    • Broadband Push-to-X
    • Project 25
    • Public-Safety Broadband/FirstNet
    • Virtual/Augmented Reality
    • Land Mobile Radio
    • Long Term Evolution (LTE)
    • Applications
    • Drones/Robots
    • IoT/Smart X
    • Software
    • Subscriber Devices
    • Video
  • Call Center/Command
    • Back
    • Artificial Intelligence
    • NG911
    • Alerting Systems
    • Analytics
    • Dispatch/Call-taking
    • Incident Command/Situational Awareness
    • Tracking, Monitoring & Control
  • Network Tech
    • Back
    • Cybersecurity
    • Interoperability
    • LMR 100
    • LMR 200
    • Backhaul
    • Deployables
    • Power
    • Tower & Site
    • Wireless Networks
    • Coverage/Interference
    • Security
    • System Design
    • System Installation
    • System Operation
    • Test & Measurement
  • Operations
    • Back
    • Critical Infrastructure
    • Enterprise
    • Federal Government/Military
    • Public Safety
    • State & Local Government
    • Training
  • Regulations
    • Back
    • Narrowbanding
    • T-Band
    • Rebanding
    • TV White Spaces
    • None
    • Funding
    • Policy
    • Regional Coordination
    • Standards
  • Organizations
    • Back
    • AASHTO
    • APCO
    • DHS
    • DMR Association
    • ETA
    • EWA
    • FCC
    • IWCE
    • NASEMSO
    • NATE
    • NXDN Forum
    • NENA
    • NIST/PSCR
    • NPSTC
    • NTIA/FirstNet
    • P25 TIG
    • TETRA + CCA
    • UTC
acc.com

Urgent Matters


Latest DDoS attack exposes significant security vulnerability associated with some IoT devices

  • Written by Donny Jackson
  • 25th October 2016
Last Friday's distributed denial of service (DDoS) attack that caused significant web-site outages throughout the U.S. should be a wakeup call to the tech industry, as lackluster security on many Internet of Things (IoT) devices is being cited as a key reason the attack was possible.

What is in this article?

  • Latest DDoS attack exposes significant security vulnerability associated with some IoT devices
  • Latest DDoS attack exposes significant vulnerability associated with the IoT advancements

Latest DDoS attack exposes significant security vulnerability associated with some IoT devices

One of the great things about this job is that I often get the opportunity to see technologies and how they can be used to help improve efficiencies in myriad ways, from database queries and remote monitoring to video-surveillance equipment and the Internet of Things (IoT), which includes everything from sensor technologies to drones and robots.

It is amazing what engineers and other innovators continue to develop. What began as simple conveniences—remote controls for TVs and garage doors—has matured into access technologies that allow untethered access to the Internet and the ability to use robots/drones to execute dangerous tasks without putting a human in harm’s way.

But these capabilities are not simply a one-way panacea, as there are tradeoffs. In addition to the moral and social implications, the reality is that any technology developed can be used for negative purposes as well as to benefit society.

For example, in an IP-based, all-connected scenario, employees do not have to be tied to a given physical location to monitor the status of an asset half a world away; they can monitor—and often fix, if necessary—that asset from a remote location. But this convenience also means that nefarious characters also can wreak havoc, if they can gain access to the right network.

In some cases, inappropriate access can result in data breaches, malware or ransomware attacks that have become all too common, from every type of enterprise to very high levels of government. In other cases, inappropriate access can be leveraged to execute distributed denial of services (DDoS) attacks, which amount to a digital equivalent of radio-frequency (RF) jamming that can render an otherwise robust network useless.

That is what happened last Friday, when a massive DDoS attack caused Internet outages and brought many of the most popular web sites—for instance, Twitter, Netflix, PayPal, CNN and the New York Times—to their knees. Perhaps even more disconcerting than the outages themselves are reports of how the attacks were perpetratrated: a malware program known as Mirai infected a host of security-challenged Internet-connected assets—from DVRs, surveillance cameras and other devices—that bombarded servers at Dyn DNS Company, which specializes in online infrastructure.

Now, the fact that many Internet of Things (IoT) devices tend to have little or no security included in them is no secret, so the theoretical possibility of such an attack has been discussed for some time. But Friday’s attack was not theoretical; it was very real.

Given this, the episode should serve as a huge wakeup call to the IoT industry and to enterprises—including public safety—that cybersecurity is an area that is in dire need of greater focus. As IoT use cases develop and more entities seek to leverage the considerable functionality that this burgeoning industry can provide, low-security devices cannot be connected haphazardly to critical networks that must function effectively at all times.

Of course, no one wants to burden the IoT arena with so many security requirements that devices become too expensive and complicated to be deployed. Is there a happy medium that provides both security and simplicity? It is a challenge that faces FirstNet with its much-anticipated network, and one that the entire technology community should establish as a top priority.

1 | 2 |
Latest DDoS attack exposes significant vulnerability associated with the IoT advancements
Tags: Security Commentary Critical Infrastructure Cybersecurity Public Safety Public-Safety Broadband/FirstNet Security Software Urgent Matters Commentary

Related Content

Commentary


How 5G is making cities safer, smarter, and more efficient

26th January 2023

3GPP moves Release 18 freeze date to March 2024

18th January 2023

Do smart cities make safer cities?

  • 1
6th January 2023
view all

Events


UC Ezines


IWCE 2019 Wrap Up

13th May 2019
view all

Twitter


UrgentComm

Public-safety coalition renews efforts to secure federal NG911 funding dlvr.it/ShwGfn

4th February 2023
UrgentComm

Newscan: Cyberattacks on DoE national labs draw lawmaker scrutiny dlvr.it/Shvpw3

3rd February 2023
UrgentComm

The shine begins to wear off 5G private wireless dlvr.it/Shth0P

3rd February 2023
UrgentComm

Phishers trick Microsoft into granting them ‘verified’ Cloud Partner status dlvr.it/Shqngn

2nd February 2023
UrgentComm

Shapeshifting robot can morph from a liquid to a solid dlvr.it/Shqk9K

2nd February 2023
UrgentComm

Automakers against stampede to BEV dominance dlvr.it/ShpX08

2nd February 2023
UrgentComm

FCC nominee Gigi Sohn headed for third Senate hearing dlvr.it/ShpDcZ

1st February 2023
UrgentComm

Sign up to learn how to successfully manage your Motorola ASTRO® 25 System: spr.ly/60143j8fp https://t.co/XcxiUwzN27

1st February 2023

Newsletter

Sign up for UrgentComm’s newsletters to receive regular news and information updates about Communications and Technology.

Expert Commentary

Learn from experts about the latest technology in automation, machine-learning, big data and cybersecurity.

Business Media

Find the latest videos and media from the market leaders.

Media Kit and Advertising

Want to reach our digital and print audiences? Learn more here.

DISCOVER MORE FROM INFORMA TECH

  • American City & County
  • IWCE
  • Light Reading
  • IOT World Today
  • Mission Critical Technologies
  • TU-Auto

WORKING WITH US

  • About Us
  • Contact Us
  • Events
  • Careers

FOLLOW Urgent Comms ON SOCIAL

  • Privacy
  • CCPA: “Do Not Sell My Data”
  • Cookie Policy
  • Terms
Copyright © 2023 Informa PLC. Informa PLC is registered in England and Wales with company number 8860726 whose registered and Head office is 5 Howick Place, London, SW1P 1WG.