No wonder the world is moving towards digitalisation at a very fast pace. We have smart phones, smart homes, small schools, smart malls, smart roads and smart cities. Undoubtedly, digitalization is improving our lifestyle; we are more civilized than before, but the question is: “ARE WE SECURE“?
With the advancement of various hardware and software technologies, there are more and more IoT devices, which leads to an insecure environment. As millions of devices are connected, it creates a larger attack surface, which increases the opportunities for attackers. Both software and hardware attacks are increasing day by day. A single vulnerability can harm the entire network and also harm the society. There are many open source tools available for hackers and attackers. Even though many Anti-Forensics tools and techniques are available which help the intruder to protect themselves from future investigations. Even though the use of Anti Forensic tools and techniques is illegal, we need to ensure that the strict laws against the use of forensic tools are followed.
Imagine a situation where there is a vulnerability in software used by millions of smartphone users. There are a number of reasons for vulnerabilities in IOT devices that make them insecure. They can be software, hardware or network vulnerabilities. There are also some other reasons for vulnerability in IoT devices. Some of them are listed below: –
These insecure devices allow cyber criminals to hijack (gain access to) the devices and launch further attacks on other systems. Example: After gaining access to a remote target system, the intruder next attempts to gather more network information, such as about other systems available on the network. To this end, the intruder may use the ‘nbtstat’ command to view the contents of the NetBIOS cache. In addition, the intruder can collect information about the network connections running to and from the victim system. To do this, the intruder can use the ‘netstat’ command. In this way, the intruder can hijack millions of devices through a single device and perform various attacks such as DoS and DDos attacks and also damage the entire network. There is no end to the malicious activities.
The more insecure devices, the more cyber-attacks.
Authored by.
Dr. Rama Bhatia Singh – MDIS School of Engineering and Technology
For many working professionals, the decision to further their studies with a degree in Singapore…
From Student to Digital Marketer: How the MDIS Higher Diploma in Mass Communication Became a…
Victor’s story is one of transformation, perseverance, and global contribution. Once a student at the…
In today’s rapidly evolving global economy, professionals are increasingly seeking postgraduate qualifications that combine academic…
In an age of YouTube tutorials, online certifications and startup success stories, many students fresh…