Browse Definitions :
Definition

FBI Alert Number I-091015-PSA

FBI Alert Number I-091015-PSA is a public service announcement from the United States Federal Bureau of Investigation to inform individuals and organizations about the importance of Internet of Things (IoT) security, including potential vulnerabilities and protective measures that should be taken to mitigate risk associated with them.

The title of the public service announcement is “Internet of Things poses opportunities for cyber crime.” The essence of the IoT is the idea that almost anything can be equipped with a unique identifier and the ability to communicate over a network. What that means is that the number of connected devices is increasing quickly and exponentially and the potential attack surface is increasing at least as rapidly and significantly. What may be lagging, however, is the security measures required to protect that expanding attack surface.

Much of the increase in IoT communication comes from computing devices and embedded sensor systems used in industrial machine-to-machine (M2M) communication, smart energy gridshome and building automationvehicle to vehicle communication and wearable computing devices. Because the idea of networking such items as home appliances and other non-computing devices is relatively new, products that can be IoT devices (things) may not be designed with security in mind.

The FBI lists the following examples of IoT devices:

  • Automated devices which remotely or automatically adjust lighting or HVAC
  • Security systems, such as security alarms or Wi-Fi cameras, including video monitors used in nursery and daycare settings
  • Medical devices, such as wireless heart monitors or insulin dispensers
  • Thermostats
  • Wearables, such as fitness devices
  • Lighting modules which activate or deactivate lights
  • Smart appliances, such as smart refrigerators and TVs
  • Office equipment, such as printers
  • Entertainment devices to control music or television from a mobile device
  • Fuel monitoring systems

Any device in that list can be hacked if connected to the Internet and not adequately protected. Furthermore, hacked devices can provide an attacker with access to sensitive data on the same network. During her keynote address at the 2015 IoT Security Conference in Boston, FBI CISO Arlette Hart discussed how the growth rate of the Internet of Things is outpacing security efforts and implored enterprises to take action before disaster strikes. Hart remarked that in technology, "Cool trumps safe. The capabilities, themselves, are almost always developed without security in mind. We need to change that."

 

This was last updated in January 2016

Continue Reading About FBI Alert Number I-091015-PSA

SearchCompliance
  • pure risk

    Pure risk refers to risks that are beyond human control and result in a loss or no loss with no possibility of financial gain.

  • risk reporting

    Risk reporting is a method of identifying risks tied to or potentially impacting an organization's business processes.

  • risk avoidance

    Risk avoidance is the elimination of hazards, activities and exposures that can negatively affect an organization and its assets.

SearchSecurity
  • script kiddie

    Script kiddie is a derogative term that computer hackers coined to refer to immature, but often just as dangerous, exploiters of ...

  • cipher

    In cryptography, a cipher is an algorithm for encrypting and decrypting data.

  • What is risk analysis?

    Risk analysis is the process of identifying and analyzing potential issues that could negatively impact key business initiatives ...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • fault-tolerant

    Fault-tolerant technology is a capability of a computer system, electronic system or network to deliver uninterrupted service, ...

  • synchronous replication

    Synchronous replication is the process of copying data over a storage area network, local area network or wide area network so ...

SearchStorage
  • gigabyte (GB)

    A gigabyte (GB) -- pronounced with two hard Gs -- is a unit of data storage capacity that is roughly equivalent to 1 billion ...

  • MRAM (magnetoresistive random access memory)

    MRAM (magnetoresistive random access memory) is a method of storing data bits using magnetic states instead of the electrical ...

  • storage volume

    A storage volume is an identifiable unit of data storage. It can be a removable hard disk, but it does not have to be a unit that...

Close