Browse Definitions :
Definition

FBI Alert Number I-091015-PSA

Contributor(s): Matthew Haughn

FBI Alert Number I-091015-PSA is a public service announcement from the United States Federal Bureau of Investigation to inform individuals and organizations about the importance of Internet of Things (IoT) security, including potential vulnerabilities and protective measures that should be taken to mitigate risk associated with them.

The title of the public service announcement is “Internet of Things poses opportunities for cyber crime.” The essence of the IoT is the idea that almost anything can be equipped with a unique identifier and the ability to communicate over a network. What that means is that the number of connected devices is increasing quickly and exponentially and the potential attack surface is increasing at least as rapidly and significantly. What may be lagging, however, is the security measures required to protect that expanding attack surface.

Much of the increase in IoT communication comes from computing devices and embedded sensor systems used in industrial machine-to-machine (M2M) communication, smart energy gridshome and building automationvehicle to vehicle communication and wearable computing devices. Because the idea of networking such items as home appliances and other non-computing devices is relatively new, products that can be IoT devices (things) may not be designed with security in mind.

The FBI lists the following examples of IoT devices:

  • Automated devices which remotely or automatically adjust lighting or HVAC
  • Security systems, such as security alarms or Wi-Fi cameras, including video monitors used in nursery and daycare settings
  • Medical devices, such as wireless heart monitors or insulin dispensers
  • Thermostats
  • Wearables, such as fitness devices
  • Lighting modules which activate or deactivate lights
  • Smart appliances, such as smart refrigerators and TVs
  • Office equipment, such as printers
  • Entertainment devices to control music or television from a mobile device
  • Fuel monitoring systems

Any device in that list can be hacked if connected to the Internet and not adequately protected. Furthermore, hacked devices can provide an attacker with access to sensitive data on the same network. During her keynote address at the 2015 IoT Security Conference in Boston, FBI CISO Arlette Hart discussed how the growth rate of the Internet of Things is outpacing security efforts and implored enterprises to take action before disaster strikes. Hart remarked that in technology, "Cool trumps safe. The capabilities, themselves, are almost always developed without security in mind. We need to change that."

 

This was last updated in January 2016

Continue Reading About FBI Alert Number I-091015-PSA

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

Powered by:

SearchCompliance

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

  • data protection impact assessment (DPIA)

    A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, ...

SearchSecurity

  • cybersecurity insurance (cybersecurity liability insurance)

    Cybersecurity insurance, also called cyber liability insurance or cyber insurance, is a contract that an entity can purchase to ...

  • phishing

    Phishing is a form of fraud in which an attacker masquerades as a reputable entity or person in email or other communication ...

  • cybercrime

    Cybercrime is any criminal activity that involves a computer, networked device or a network.

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

SearchStorage

  • NVMe over Fabrics (NVMe-oF)

    NVMe over Fabrics, also known as NVMe-oF and non-volatile memory express over fabrics, is a protocol specification designed to ...

  • logical unit number (LUN)

    A logical unit number (LUN) is a unique identifier for designating an individual or collection of physical or virtual storage ...

  • CIFS (Common Internet File System)

    CIFS (Common Internet File System) is a protocol that gained popularity around the year 2000, as vendors worked to establish an ...

Close