Tingenes internet: Forskelle mellem versioner
Content deleted Content added
m ændre sorteringsnøgle til Kategori:Internet |
Alpinu (diskussion | bidrag) m →Manglende sikkerhed?: English spelling (trough -> through) |
||
Linje 17:
== Manglende sikkerhed? ==
Der er kritik af tingenes internets [[it-sikkerhed]], bl.a. grundet utilstrækkelig sikkerhedsniveau af krypteringen og for let netadgang - og tingene, fx professionelle nettilkoblede [[overvågningskamera]]er, [[DSL-modem]]s, [[hjemmerouter]]e, [[køleskab]]e, [[toilet]]ter, [[Smart-tv]], [[bygningsautomatik]], [[industriautomatik]], [[videooptager]]e - bliver yderst sjældent opdateret for sårbarheder, hvis det i det hele taget er muligt at få sikkerhedspatchet [[firmware]] til dem.<ref>[http://www.version2.dk/artikel/sikkerhedsekspert-internet-things-er-skraemmende-57003 27. marts 2014, version2.dk: Sikkerhedsekspert: 'Internet of Things' er skræmmende]</ref><ref>[http://ing.dk/artikel/ringe-zigbee-sikkerhed-kan-saette-fut-i-komfuret-128587 23. apr 2012, ing.dk: Ringe Zigbee-sikkerhed kan sætte fut i komfuret] Citat: "...Zigbee eller Zwave, men disse protokoller har ikke samme sikkerhedsniveau, som vi eksempelvis kender fra wifi, advarer dansk forsker..."</ref><ref>[http://www.flatpanels.dk/nyhed.php?subaction=showfull&id=1376302288 12 Aug 2013, flatpanels.dk: Dit TVs kamera kan overvåge dig, siger senator] Citat: "...Sagen omkring Smart TV startede egentlig i 2012, hvor en hacker demonstrerede, hvordan han på nem vis kunne overvåge familier hjemme i stuen via det indbyggede kamera i Samsungs Smart TV – uden familien vel og mærke bemærkede det..."</ref><ref>[http://www.zdnet.com/blog/security/shodan-search-exposes-insecure-scada-systems/7611 November 2, 2010, Shodan search exposes insecure SCADA systems] fx industriautomatik og bygningsautomatik.</ref><ref>[http://www.wired.com/2014/01/theres-no-good-way-to-patch-the-internet-of-things-and-thats-a-huge-problem/ 01.06.14, wired.com: The Internet of Things Is Wildly Insecure — And Often Unpatchable] Citat: "...a researcher looked at thirty home routers and broke into half of them...survey of common home routers found that the software components were four to five years older than the device...To make matters worse, it’s often impossible to patch the software or upgrade...Even when a patch is possible, it’s rarely applied...Last month, Symantec reported on a Linux worm that targets routers, cameras, and other embedded devices...'''And the Internet of Things will only make this problem worse,'''...new embedded devices that will be equally poorly maintained and unpatchable..."</ref><ref>[http://labs.sogeti.com/internet-un-maintained-insecure-things/ June 10, 2014, labs.sogeti.com: The Internet of un-maintained and insecure Things?] Citat: "...However, it also poses a problem: increased vulnerability
Der har været nogle forslag til, hvordan sikkerheden kan forbedres. Et af dem er [[Trusted Platform Module]] med den rette test firmware ifølge [[Fraunhofer-Gesellschaft]].<ref>[http://www.sciencedaily.com/releases/2014/03/140305084610.htm Fraunhofer-Gesellschaft. (2014, March 5). Security tools for Industry 4.0. ScienceDaily] Citat: "...the [[Trusted Platform Module]]. This relates to a small computer chip that can encrypt, decrypt, and digitally sign the data. Installed into a network component, it indicates which software is running on the component, and assigns a distinct identity to it. "As soon as the software changes in a component, the adjacent component registers this occurrence and notifies the administrator. Hacker attacks can be exposed quickly and easily this way," says Rudolph. "Both security technologies are important building blocks for the targeted [[Industry 4.0]] scenario," says Dexheimer..."</ref>
|