Tingenes internet: Forskelle mellem versioner

Content deleted Content added
m ændre sorteringsnøgle til Kategori:Internet
Alpinu (diskussion | bidrag)
m →‎Manglende sikkerhed?: English spelling (trough -> through)
Linje 17:
 
== Manglende sikkerhed? ==
Der er kritik af tingenes internets [[it-sikkerhed]], bl.a. grundet utilstrækkelig sikkerhedsniveau af krypteringen og for let netadgang - og tingene, fx professionelle nettilkoblede [[overvågningskamera]]er, [[DSL-modem]]s, [[hjemmerouter]]e, [[køleskab]]e, [[toilet]]ter, [[Smart-tv]], [[bygningsautomatik]], [[industriautomatik]], [[videooptager]]e - bliver yderst sjældent opdateret for sårbarheder, hvis det i det hele taget er muligt at få sikkerhedspatchet [[firmware]] til dem.<ref>[http://www.version2.dk/artikel/sikkerhedsekspert-internet-things-er-skraemmende-57003 27. marts 2014, version2.dk: Sikkerhedsekspert: 'Internet of Things' er skræmmende]</ref><ref>[http://ing.dk/artikel/ringe-zigbee-sikkerhed-kan-saette-fut-i-komfuret-128587 23. apr 2012, ing.dk: Ringe Zigbee-sikkerhed kan sætte fut i komfuret] Citat: "...Zigbee eller Zwave, men disse protokoller har ikke samme sikkerhedsniveau, som vi eksempelvis kender fra wifi, advarer dansk forsker..."</ref><ref>[http://www.flatpanels.dk/nyhed.php?subaction=showfull&id=1376302288 12 Aug 2013, flatpanels.dk: Dit TVs kamera kan overvåge dig, siger senator] Citat: "...Sagen omkring Smart TV startede egentlig i 2012, hvor en hacker demonstrerede, hvordan han på nem vis kunne overvåge familier hjemme i stuen via det indbyggede kamera i Samsungs Smart TV – uden familien vel og mærke bemærkede det..."</ref><ref>[http://www.zdnet.com/blog/security/shodan-search-exposes-insecure-scada-systems/7611 November 2, 2010, Shodan search exposes insecure SCADA systems] fx industriautomatik og bygningsautomatik.</ref><ref>[http://www.wired.com/2014/01/theres-no-good-way-to-patch-the-internet-of-things-and-thats-a-huge-problem/ 01.06.14, wired.com: The Internet of Things Is Wildly Insecure — And Often Unpatchable] Citat: "...a researcher looked at thirty home routers and broke into half of them...survey of common home routers found that the software components were four to five years older than the device...To make matters worse, it’s often impossible to patch the software or upgrade...Even when a patch is possible, it’s rarely applied...Last month, Symantec reported on a Linux worm that targets routers, cameras, and other embedded devices...'''And the Internet of Things will only make this problem worse,'''...new embedded devices that will be equally poorly maintained and unpatchable..."</ref><ref>[http://labs.sogeti.com/internet-un-maintained-insecure-things/ June 10, 2014, labs.sogeti.com: The Internet of un-maintained and insecure Things?] Citat: "...However, it also poses a problem: increased vulnerability troughthrough an internet of un-maintained things. And it’s already happening today. Security firm Proofpoint found that more than 100,000 smart devices–including a connected refrigerator–were used to send out more than 750,000 malicious emails between Dec. 23, 2013 and Jan. 6, 2014. Other embedded systems that got hacked included gadgets, routers, media servers and televisions..."</ref><ref>[http://www.computerworld.com/s/article/9247485/6_ways_the_Internet_of_Things_will_transform_enterprise_security?pageNumber=1 April 7, 2014, computerworld.com: 6 ways the Internet of Things will transform enterprise security] Citat: "...1. The IoT will create billions of new (insecure) end points...IoT devices will typically not be protected with whatever anti-spam, anti-virus and anti-malware infrastructures are available, nor will they be routinely monitored by IT teams or receive patches to address new security issues as they arise, Chiu said..."</ref><ref>[http://www.thestreet.com/story/12027133/1/digitalskeptic-we-have-built-an-internet-of-really-vulnerable-things.html thestreet.com: #DigitalSkeptic: We Have Built an Internet of Really Vulnerable Things] Citat: "...I kid you not, Chicago-based security firm Trustwave has reverse-engineered a high-end Japanese Internet-enabled toilet called the LIXIL Satis. Now any creep with a Web connection can ... I can't even write the sentence, it's so bizarre...it's clear most everything in our homes thus connected can be compromised in similar ways..."</ref><ref>[http://motherboard.vice.com/read/the-heartbleed-bug-will-lurk-in-the-internet-of-things-for-decades April 11, 2014, motherboard.vice.com: The Heartbleed Bug Will Lurk in the Internet of Things for Decades] Citat: "...The internet is still reeling from the [[Heartbleed bug]] discovered this week...Anything from industry IT equipment to home automation systems are vulnerable: wireless routers, cable boxes, security cameras, and an array of smart gadgets...And 10 years from now you're going to have a factory blow up or something because someone has been able to exploit this bug..."</ref><ref>[http://www.wired.com/2012/05/cctv-hack/ 05.15.12, wired.com: Popular Surveillance Cameras Open to Hackers, Researcher Says]</ref><ref>[http://gizmodo.com/5979528/tons-and-tons-of-security-cameras-are-wide-open-to-hackers 1/28/13, gizmodo.com: Tons and Tons of Security Cameras Are Wide Open to Hackers] Citat: "...In short, the flaw allows anyone connected to a specific port full access to the DVR functions of the cameras..."</ref><ref>[http://www.version2.dk/artikel/googles-termostater-afsloeret-med-gabende-sikkerhedshul-68156 12. august 2014, version2.dk: Googles termostater afsløret med gabende sikkerhedshul] Citat: "...På egen hånd kan en Nest-enhed inficeret med malware bruges til at spionere på husets beboere, for eksempel ved at sende beskeder af sted om, hvornår der er nogen hjemme. Men fordi den er tilsluttet netværket, og koderne til netværket ligger tilgængelige i klartekst, kan en hacker også udnytte en Nest-enhed som en trædesten til angreb på mere traditionelle computere i hjemmet..."</ref>
 
Der har været nogle forslag til, hvordan sikkerheden kan forbedres. Et af dem er [[Trusted Platform Module]] med den rette test firmware ifølge [[Fraunhofer-Gesellschaft]].<ref>[http://www.sciencedaily.com/releases/2014/03/140305084610.htm Fraunhofer-Gesellschaft. (2014, March 5). Security tools for Industry 4.0. ScienceDaily] Citat: "...the [[Trusted Platform Module]]. This relates to a small computer chip that can encrypt, decrypt, and digitally sign the data. Installed into a network component, it indicates which software is running on the component, and assigns a distinct identity to it. "As soon as the software changes in a component, the adjacent component registers this occurrence and notifies the administrator. Hacker attacks can be exposed quickly and easily this way," says Rudolph. "Both security technologies are important building blocks for the targeted [[Industry 4.0]] scenario," says Dexheimer..."</ref>