CIOAdvisor Apac

  • Home
  • Vendors
  • News
  • Conference
  • Whitepapers
  • Newsletter
  • Subscribe
  • About Us
  • Specials

  • Menu
      • Ad Management
      • Application Security Testing
      • Artificial Intelligence
      • BPO
      • Contact Center
      • Data Analytics
      • Deep Learning
      • Digital Marketing
      • Digital Transformation
      • Disaster Recovery Services
      • Disinfection and Sanitization
      • E-Invoicing
      • Ecommerce
      • Govt Tech
      • HubSpot
      • Human Resource
      • ICT
      • IoT
      • Laser and Photonics
      • Leadership Development
      • Logistics
      • Machine Learning
      • Marketing Technology
      • Mobile Application
      • Parking Management
      • Payment And Card
      • SDN
      • Telecom
  • Digital Transformation
  • Logistics
  • Payment And Card
  • Artificial Intelligence
Specials
  • Specials

  • Ad Management
  • Application Security Testing
  • Artificial Intelligence
  • BPO
  • Contact Center
  • Data Analytics
  • Deep Learning
  • Digital Marketing
  • Digital Transformation
  • Disaster Recovery Services
  • Disinfection and Sanitization
  • E-Invoicing
  • Ecommerce
  • Govt Tech
  • HubSpot
  • Human Resource
  • ICT
  • IoT
  • Laser and Photonics
  • Leadership Development
  • Logistics
  • Machine Learning
  • Marketing Technology
  • Mobile Application
  • Parking Management
  • Payment And Card
  • SDN
  • Telecom
×
#

CIO Advisor APAC Weekly Brief

Be first to read the latest tech news, Industry Leader's Insights, and CIO interviews of medium and large enterprises exclusively from CIO Advisor APAC

Subscribe

loading
  • Home
  • IoT
  • Vendor Viewpoint

THANK YOU FOR SUBSCRIBING

The need for IoT security and vulnerability management

Hyun Chul Jung, President & CEO, NORMA

Tweet
content-image
Recent trend about IoT security

Recently the US House of Representatives passed the “Internet of Things Cyber Security Improvement Bill” (September 14, 2020), which sets security standards for IoT devices connected to the federal network and in China the Ministry of Industry and Information Technology has announced the promotion of the overall development of the mobile IoT especially in the field of NB-IoT, 4G and 5G. Globally the requirements for vulnerability management for IoT devices are in full swing.

Recently the home IoT market is booming. IoT devices are produced only in Northeast Asia such as China, Taiwan, and Korea. Due to the cost factors, it is often designed without considering security in IoT products. Generally IoT devices have different Operating Systems and applications in comparison with those existing PCs. Hence the vulnerability management is seriously needed.

What is the vulnerability of IoT devices?

The infringement accidents targeting IoT devices are mainly caused by poor management, such as using default accounts or passwords that are easy to guess, or “vulnerabilities of the device itself”.





IoT device’s vulnerabilities are sometimes created by manufacturers for the convenience of management and service support, such as backdoors, when released with accounts or settings created for developer’s convenience with the zero security consideration.

What are the problems caused by the failure to manage vulnerabilities?

IoT devices having poor and unmanaged security are exposed to their system access by the account information acquired from the Internet. This information is mainly used as a hacker's attacking tool.

IoT hacking is frequently aimed at individuals' privacy rather than corporates, or public institutions. The biggest problem is that if the home network is hacked, the IoT device can be arbitrarily manipulated. The lighting control, gas valve operation, door opening, etc. can seriously affect the individuals’ safety. In particular, the personal devices with weak security need to be taken care of cautiously, as the relevant hacking damages can be extended to other devices, or users.

Reviewing the cases of IoT hacking up to now, the most of problems relate IP cameras, smart toys, and personal CCTVs. There have been many cases in which smart toys were abused for remote control via their built-in microphones and speakers and the personal information stored in servers were stolen. Especially IP cameras were the frequent infringement target, enabling the hacker’s theft of personal information and access to the web server remotely. This is extremely dangerous, since not to mention personal information, but the privacy can be infringed.

Until today there is no institute, or website providing the full vulnerability information found in IoT devices. There are approximately 200,000 cases known as CVEs to date. We see that the number of vulnerabilities related to IoT devices is 45,000 only. Among them, the number of vulnerabilities that can be identified online, such as service port vulnerabilities excluding offline vulnerabilities, is estimated to be 6,000 only. Norma has consistently compiled a fully accrued list of IoT vulnerabilities that have occurred worldwide since 2015 and is proud to have such enormous data base in relevant to IoT vulnerabilities.
tag

Information Technology

ON THE DECK

IoT 2021

Top Vendors

IoT 2020

Top Vendors

IoT 2019

Top Vendors

IoT 2018

Top Vendors

Previous Next
Top 10 Internet of Things Solution Companies - 2021

Editors Choice

  • Top 3 Trends of Contact Center Technology
    Top 3 Trends of Contact Center Technology
  • The Rise of Meaningful Communication: 2020 Trends for Enterprise Mobile Messaging
    The Rise of Meaningful Communication: 2020 Trends for Enterprise Mobile Messaging
  • Avoiding the Blind Spot and Misperception in Chatbot & Digital Transformation Initiatives
    Avoiding the Blind Spot and Misperception in Chatbot & Digital Transformation Initiatives
  • Ezvoicetek: Fortifying Customer Support with Advanced Technology
    Ezvoicetek: Fortifying Customer Support with Advanced Technology
  • GP Asia: Delivering Effective Customer Interaction for All
    GP Asia: Delivering Effective Customer Interaction for All
  • What makes Contact Centers and Call Centers Different?
    What makes Contact Centers and Call Centers Different?

I agree We use cookies on this website to enhance your user experience. By clicking any link on this page you are giving your consent for us to set cookies. More info

Copyright © 2025 CIO Advisorapac. All rights reserved. Registration on or use of this site constitutes acceptance of our Terms of Use and Privacy Policy |  Sitemap

follow on linkedinfollow on twitter
This content is copyright protected

However, if you would like to share the information in this article, you may use the link below:

https://iot.cioadvisorapac.com/vp/NORMA/the_need_for_iot_security_and_vulnerability_management