IP-enabled devices: Why Not Forgo Encryption and Authentication?
IP-enabled devices provide convenience to users by allowing a device to connect directly to a network. Smart home automation devices may allow a user to use their device to turn on the lights, ring a doorbell, control their thermostat, or monitor their home via security cameras. Lateral movement attacks allow a dangerous hacker to exploit vulnerabilities in insecure smart home automation devices and allow them to move laterally within your network. While Encryption and Authentication may prevent a quick, convenient setup, every insecure device that sits on a network significantly increases the risk that a hacker will gain access to sensitive data and private servers. IP-enabled devices operate over simple ethernet, Wi-Fi, TCP, and internet protocols. The data is transmitted via clear text, which allows dangerous hackers to use WireShark to view the clear text transmitted data and intercept your system. A hacker could easily discover the device using a Python script and use a tool like NMAP to discover the open ports that can be exploited.
Internet of Things and home automation devices require secure communication over HTTPS. While microprocessors that run these services require regular maintenance, such as upgrading SSL certificate fingerprints, every year, providing secure maintenance is a high-risk activity that could result in a device being locked out of communication with otherwise authorized servers.
Technology undeniably pushes society to advance in powerful ways; however, device creators have an ethical responsibility to educate their users on protecting their networks from exploitation. Many users are unaware that they should go to their wireless security settings to enable encryption. Strong passwords and two-step authentication seem like a hassle to the everyday user that struggles to simply get the device up and running. We live in a society where instant gratification often becomes more important than long-term success. Companies must strive to meet the demands of an ever-changing market built on user convenience while also ensuring that the devices they create do not create vulnerabilities that unintentionally harm the user.
Comments
Post a Comment