Newsletter Anmeldung

Bleiben Sie mit dem Newsletter immer up to date.

Request
arrow-to-top
HomeConsultancyIT securityIoT – Internet of Things
Niklaus Manser
Head of IT Security Consulting
request

IoT – Internet of Things

Intelligent networking requires intelligent security concepts

The new possibilities opened up by IoT require a particularly consistent approach and innovative solutions when it comes to information security. You can therefore rely on the know-how of our experienced specialists. They will advise and support you in all security matters relating to IoT and beyond.

 

IoT – What is that?

Put simply, “things”, i.e. physical and virtual things, are networked and communicate with each other. Many IoT applications concern industry, energy and transport. However, IoT is also increasingly influencing and determining the private sphere: the remote control of electronic household appliances or home LED lighting is convenient and can generate more security or less power consumption, and the numerous applications with which steps, heart and pulse rates, etc. are determined and evaluated (e.g. smart watch) are already a matter of course.

IoT is based on the concept of recording and collecting data from a wide range of areas, and sharing and using it via the internet. This is made possible by various components such as sensors and actuators, but above all by so-called smarts. Smarts are computing, coordinating, communicating and controlling components that can appear in any form and number, depending on the application. Smarts collect and process the information collected by sensors. In addition, they can transfer control tasks to actuators and offer interfaces for human interactions.

IoT – What is it good for?

The great advantage of IoT lies in the simplification of processes, which leads to a significant increase in efficiency. By collecting any amount of data and information, devices can be controlled and monitored regardless of location. This saves resources and provides unprecedented flexibility and convenience in everyday life.

Where is IoT already being successfully used?

  • In the industrial sector: remote monitoring of industrial plants, e.g. Industrial Control Systems (ICS).
  • In the energy sector: Smart Grid, Smart Energy (keyword smart electricity grids, increasing grid efficiency)
  • In traffic management: Smart City (recording traffic flows)
  • In the healthcare sector: IoT devices, for example, for monitoring or even controlling patients’ vital signs

And security? What are the risks?

As with all new or evolving technologies, the many benefits are offset by security-related risks. IoT offers the possibility to collect and process huge amounts of data, including critical personal data or information about critical infrastructures. Such data collections are valuable and therefore potentially on the radar of data thieves. There is also a risk that criminals will seize control of IoT devices and their controls. The question of who actually owns the data on IoT devices is not conclusively resolved.

 

IoT – but securely: with the support of our experienced specialists

The many possibilities opened up by IoT require a particularly consistent approach when it comes to information security.

Rely on the experience and know-how of our specialists and secure their support and advice in the following areas:

  • Conceptual support based on recognised frameworks, for example
    • ISO/IEC 30141 – Internet of Things (loT) – Reference Architecture: Guidance on the definition of generic approaches to problem solving
    • ISO/IEC 15408 – Common Criteria for Information Technology Security Evaluation: Guidance for the security assessment of individual IoT applications
    • ISO/IEC 62443 – Industrial communication networks – Network and system security
    • Guide to Industrial Control Systems (ICS) Security: A comprehensive NIST document for the secure integration of ICS
  • Risk analyses
  • Audits: technical, conceptual or compliance audits
  • Situation analyses of already existing IoT devices/infrastructures
  • Evaluation of IoT manufacturers, suppliers and products
  • Development of strategies for dealing with IoT

Non-binding enquiry

© Swiss Infosec AG 2024