{"id":8629,"date":"2020-06-22T09:26:40","date_gmt":"2020-06-22T09:26:40","guid":{"rendered":"https:\/\/www.experfy.com\/blog\/?p=8629"},"modified":"2023-12-04T14:54:18","modified_gmt":"2023-12-04T14:54:18","slug":"security-of-iot-devices-ways-to-protect-yourself-part-1","status":"publish","type":"post","link":"https:\/\/www.experfy.com\/blog\/iot\/security-of-iot-devices-ways-to-protect-yourself-part-1\/","title":{"rendered":"Security of IoT Devices: Ways to Protect Yourself. Part 1"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"8629\" class=\"elementor elementor-8629\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-52cb47ab elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"52cb47ab\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-268e2484\" data-id=\"268e2484\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d7aa244 elementor-widget elementor-widget-text-editor\" data-id=\"d7aa244\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><em><strong>The issue of Internet of Things device security is one of the main growing pains that inevitably follow the industry which is expanding at a rapid pace. As <\/strong><\/em><a href=\"https:\/\/www.statista.com\/statistics\/471264\/iot-number-of-connected-devices-worldwide\/\" rel=\"noopener\"><strong><em>Statista<\/em><\/strong><\/a><em><strong> indicates, by 2025 there will be 75 bln connected devices that we will have to protect against virtual and physical attacks.<\/strong><\/em><\/p>\n<!-- \/wp:paragraph -->\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-086af4c elementor-widget elementor-widget-text-editor\" data-id=\"086af4c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\n<!-- wp:paragraph -->\n<p>One of the main security indicators of IoT devices is the ability to personalize a device without additional effort and expense (connect it to the network and enter access keys). In addition, code integrity and the ability to withstand attacks are important. Problems arise both on the part of users and manufacturers. For example, not all device owners replace factory passwords with more complex ones. Manufacturers, in the pursuit of quick money and the desire to quickly bring the device to the market, do not always properly test their product codes.<\/p>\n<!-- \/wp:paragraph -->\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-94525e2 elementor-widget elementor-widget-image\" data-id=\"94525e2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"481\" src=\"https:\/\/www.experfy.com\/blog\/wp-content\/uploads\/2020\/06\/Untitled-2-5-1.png\" class=\"attachment-large size-large wp-image-34628\" alt=\"\" srcset=\"https:\/\/www.experfy.com\/blog\/wp-content\/uploads\/2020\/06\/Untitled-2-5-1.png 1024w, https:\/\/www.experfy.com\/blog\/wp-content\/uploads\/2020\/06\/Untitled-2-5-1-300x141.png 300w, https:\/\/www.experfy.com\/blog\/wp-content\/uploads\/2020\/06\/Untitled-2-5-1-768x361.png 768w, https:\/\/www.experfy.com\/blog\/wp-content\/uploads\/2020\/06\/Untitled-2-5-1-610x287.png 610w, https:\/\/www.experfy.com\/blog\/wp-content\/uploads\/2020\/06\/Untitled-2-5-1-750x352.png 750w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a3400bb elementor-widget elementor-widget-text-editor\" data-id=\"a3400bb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>More on Internet of Things weak spots was covered in our <a href=\"https:\/\/www.qulix.com\/about\/blog\/iot-security\/\" class=\"broken_link\" rel=\"noopener\">previous article<\/a>. As we noted there, the main issue with the Internet of Things is that there are no uniform security standards, which is an inevitable consequence of the broad variety of devices on the market. Sometimes you have to save on something in order to be competitive in comparison with others. And, as you may guess, the functionality often falls victim in this struggle, since you have to fill the available IoT memory with as much as possible sacrificing some lesser evil.<\/p>\n<!-- \/wp:paragraph -->\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-825e472 elementor-widget elementor-widget-heading\" data-id=\"825e472\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><!-- wp:heading -->\n<h2><strong>How to Secure IoT Devices<\/strong><\/h2>\n<!-- \/wp:heading -->\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-52aad9d elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"52aad9d\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-48bbbb1\" data-id=\"48bbbb1\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-03811c1 elementor-widget elementor-widget-text-editor\" data-id=\"03811c1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<!-- wp:paragraph -->\n<p>Botnets are a common tool which hackers use in carrying out their attacks. One of the most vivid occurrences took place in 2016 when as a result of a DDoS attack the <a href=\"https:\/\/www.theguardian.com\/technology\/2016\/oct\/26\/ddos-attack-dyn-mirai-botnet\" rel=\"noopener\">Mirai botnet<\/a> brought down most popular American websites. The malware cracked combinations of default logins and passwords and hacked thousands of IoT devices. What is more, intruders uploaded the source code on the Internet, which increased the risk of it being used by other hackers. Below is a typical architecture of a DDoS attack.<\/p>\n<!-- \/wp:paragraph -->\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1db50d6 elementor-widget elementor-widget-image\" data-id=\"1db50d6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"1024\" height=\"817\" src=\"https:\/\/www.experfy.com\/blog\/wp-content\/uploads\/2020\/06\/Untitled-3-5-1.png\" class=\"attachment-large size-large wp-image-34629\" alt=\"\" srcset=\"https:\/\/www.experfy.com\/blog\/wp-content\/uploads\/2020\/06\/Untitled-3-5-1.png 1024w, https:\/\/www.experfy.com\/blog\/wp-content\/uploads\/2020\/06\/Untitled-3-5-1-300x239.png 300w, https:\/\/www.experfy.com\/blog\/wp-content\/uploads\/2020\/06\/Untitled-3-5-1-768x613.png 768w, https:\/\/www.experfy.com\/blog\/wp-content\/uploads\/2020\/06\/Untitled-3-5-1-610x487.png 610w, https:\/\/www.experfy.com\/blog\/wp-content\/uploads\/2020\/06\/Untitled-3-5-1-750x598.png 750w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f18bb24 elementor-widget elementor-widget-text-editor\" data-id=\"f18bb24\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>These and similar attacks can bring physical harm to people (e. g. if hackers have got access to explosive and fire-hazardous equipment) or cause delays or downtime at production sites (which in turn leads to sufficient losses). In addition, by hacking one smart device, malicious users can get access to the entire network, including entrance locks and bank accounts.<\/p>\n<!-- \/wp:paragraph -->\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-583abf0 elementor-widget elementor-widget-image\" data-id=\"583abf0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"1024\" height=\"496\" src=\"https:\/\/www.experfy.com\/blog\/wp-content\/uploads\/2020\/06\/Untitled-4-5-1.png\" class=\"attachment-large size-large wp-image-34630\" alt=\"\" srcset=\"https:\/\/www.experfy.com\/blog\/wp-content\/uploads\/2020\/06\/Untitled-4-5-1.png 1024w, https:\/\/www.experfy.com\/blog\/wp-content\/uploads\/2020\/06\/Untitled-4-5-1-300x145.png 300w, https:\/\/www.experfy.com\/blog\/wp-content\/uploads\/2020\/06\/Untitled-4-5-1-768x372.png 768w, https:\/\/www.experfy.com\/blog\/wp-content\/uploads\/2020\/06\/Untitled-4-5-1-610x295.png 610w, https:\/\/www.experfy.com\/blog\/wp-content\/uploads\/2020\/06\/Untitled-4-5-1-750x363.png 750w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8591a00 elementor-widget elementor-widget-image\" data-id=\"8591a00\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"496\" src=\"https:\/\/www.experfy.com\/blog\/wp-content\/uploads\/2020\/06\/Untitled-5-4-1.png\" class=\"attachment-large size-large wp-image-34631\" alt=\"\" srcset=\"https:\/\/www.experfy.com\/blog\/wp-content\/uploads\/2020\/06\/Untitled-5-4-1.png 1024w, https:\/\/www.experfy.com\/blog\/wp-content\/uploads\/2020\/06\/Untitled-5-4-1-300x145.png 300w, https:\/\/www.experfy.com\/blog\/wp-content\/uploads\/2020\/06\/Untitled-5-4-1-768x372.png 768w, https:\/\/www.experfy.com\/blog\/wp-content\/uploads\/2020\/06\/Untitled-5-4-1-610x295.png 610w, https:\/\/www.experfy.com\/blog\/wp-content\/uploads\/2020\/06\/Untitled-5-4-1-750x363.png 750w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5182aaf elementor-widget elementor-widget-text-editor\" data-id=\"5182aaf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<!-- wp:paragraph -->\n<p>Some of these solutions were covered in our <a href=\"https:\/\/www.qulix.com\/about\/blog\/iot-security\/\" class=\"broken_link\" rel=\"noopener\">previous article<\/a>. Let\u2019s focus on certification this time.<\/p>\n<!-- \/wp:paragraph -->\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6f157d1 elementor-widget elementor-widget-heading\" data-id=\"6f157d1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><h2><strong>Can certification be the best way to<\/strong> <strong>secure IoT devices?<\/strong><\/h2>\n<!-- \/wp:heading --><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-acd30f2 elementor-widget elementor-widget-text-editor\" data-id=\"acd30f2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The issue associated with the security of IoT devices can be partially resolved by certification. Passing tests and obtaining appropriate certificates will provide clients with some protection against attacks by cybercriminals. The main condition for such a procedure is that it is available to all manufacturers and does not turn into a pure formality.<\/p>\n<!-- \/wp:paragraph -->\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-81f6748 elementor-widget elementor-widget-image\" data-id=\"81f6748\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"518\" src=\"https:\/\/www.experfy.com\/blog\/wp-content\/uploads\/2020\/06\/Untitled-6-2-1.png\" class=\"attachment-large size-large wp-image-34632\" alt=\"\" srcset=\"https:\/\/www.experfy.com\/blog\/wp-content\/uploads\/2020\/06\/Untitled-6-2-1.png 1024w, https:\/\/www.experfy.com\/blog\/wp-content\/uploads\/2020\/06\/Untitled-6-2-1-300x152.png 300w, https:\/\/www.experfy.com\/blog\/wp-content\/uploads\/2020\/06\/Untitled-6-2-1-768x389.png 768w, https:\/\/www.experfy.com\/blog\/wp-content\/uploads\/2020\/06\/Untitled-6-2-1-610x309.png 610w, https:\/\/www.experfy.com\/blog\/wp-content\/uploads\/2020\/06\/Untitled-6-2-1-750x379.png 750w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bc64045 elementor-widget elementor-widget-text-editor\" data-id=\"bc64045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<!-- wp:paragraph -->\n<p>Online Trust Alliance (OTA) came up with an idea of \u200b\u200bhow to secure your IoT devices. The company compiled a list of requirements for manufacturers and service providers \u2014 <a href=\"https:\/\/www.internetsociety.org\/iot\/trust-framework\/\" rel=\"noopener\">IoT Trust Framework<\/a>. This list should ensure the safety and viability of IoT products. Based on it, you can design certification programs for devices, as well as assess existing risks.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>A certain number of IoT certificates, which were developed by private companies, are already in use. For example, <a href=\"https:\/\/www.icsalabs.com\/technology-program\/iot-testing\" rel=\"noopener\">Verizon \u2013 ICSA Labs<\/a> created its own program that inspects the security of IoT devices.<\/p>\n<!-- \/wp:paragraph -->\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3e0dc07 elementor-widget elementor-widget-text-editor\" data-id=\"3e0dc07\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The solution developed by <a href=\"https:\/\/www.ul.com\/offerings\/cybersecurity-assurance-and-compliance\" rel=\"noopener\">UL Cybersecurity Assurance<\/a> (CAP) tests not only product safety, but entire systems as well. A CAP certificate confirms that software updates for a device will not reduce security or increase the risk of attacks.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>In 2018, the German software developer <a href=\"https:\/\/www.sap.com\/partner\/certify-my-solution\/hardware.html\" class=\"broken_link\" rel=\"noopener\">SAP<\/a> introduced its IoT device certification program in the CIS. Within its framework, devices are tested and receive a respective quality mark, which confirms that the devices are safe and can be used in IoT projects.<\/p>\n<!-- \/wp:paragraph -->\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6803478 elementor-widget elementor-widget-text-editor\" data-id=\"6803478\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The European Commissioner for Digital Economics and Society, Thibaut Kleiner, <a href=\"https:\/\/digitalenlightenment.org\/system\/files\/def-iot_conf_report_final.pdf\" class=\"broken_link\" rel=\"noopener\">believes<\/a> that measures to protect the IoT from cyberattacks should be taken at the state level, in particular, to make certification mandatory for all devices of the Internet of Things. Such a procedure should apply not only to devices, but to networks and cloud storages as well.<\/p>\n<!-- \/wp:paragraph -->\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4cc4f4e elementor-widget elementor-widget-heading\" data-id=\"4cc4f4e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><h2><strong>What can you do to secure your IoT devices?<\/strong><\/h2>\n<!-- \/wp:heading --><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8998c95 elementor-widget elementor-widget-text-editor\" data-id=\"8998c95\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>If you want to secure your Internet of Things infrastructure, you\u2019ll have to possess a carefully crafted security strategy. According to this strategy, it is necessary to protect data in the cloud, to ensure data integrity during data transfer over a public network and to thoroughly prepare devices for further use. Each next level provides better security guarantees throughout the entire infrastructure.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>This carefully thought-out security strategy can be developed and implemented with the active participation of various parties involved in the design, development and deployment of IoT devices and infrastructure. Let\u2019s consider what each of them can do to ensure the success of your IoT project.<\/p>\n<!-- \/wp:paragraph -->\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2ffdf9d elementor-widget elementor-widget-text-editor\" data-id=\"2ffdf9d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<!-- wp:list -->\n<ul>\n<li><strong>Manufacturer or integrator of IoT devices<\/strong><\/li>\n<\/ul>\n<!-- \/wp:list -->\n\n<!-- wp:paragraph -->\n<p>As a rule, these are manufacturers of deployable IoT devices, equipment integrators who assemble equipment originated from various manufacturers, or equipment suppliers who provide IoT deployment equipment manufactured or integrated by other vendors.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:list -->\n<ul>\n<li><strong>IoT solution developer<\/strong><\/li>\n<\/ul>\n<!-- \/wp:list -->\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-95281cc elementor-widget elementor-widget-text-editor\" data-id=\"95281cc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<!-- wp:paragraph -->\n<p>An IoT solution is usually developed by a software developer with a good share of expertise in this field. This developer may be part of a team within the company or a system integrator specializing in this sphere. An IoT solution developer can design various IoT solution components from scratch, integrate various box or open source components, and implement solution accelerators by introducting slight modifications to them.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:list -->\n<ul>\n<li><strong>IoT solution deployment specialist<\/strong><\/li>\n<\/ul>\n<!-- \/wp:list -->\n\n<!-- wp:paragraph -->\n<p>The developed IoT solution should be deployed in a runtime environment. At this stage, equipment is deployed, device interaction is established, and solutions are deployed on hardware devices or in the cloud.<\/p>\n<!-- \/wp:paragraph -->\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a9dd362 elementor-widget elementor-widget-text-editor\" data-id=\"a9dd362\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<!-- wp:list -->\n<ul>\n<li><strong>IoT solution operator<\/strong><\/li>\n<\/ul>\n<!-- \/wp:list -->\n\n<!-- wp:paragraph -->\n<p>Once deployed, the IoT solution requires long-term monitoring, updates, and maintenance. These tasks can be performed by a team within the company, which includes information technology specialists, equipment operation and maintenance teams, as well as specialists in a specific area who monitor the work of the entire IoT infrastructure.<\/p>\n<!-- \/wp:paragraph -->\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8b512b6 elementor-widget elementor-widget-text-editor\" data-id=\"8b512b6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<!-- wp:paragraph -->\n<p>Below we provide a quick overview of developing, deploying, and operating a secure IoT infrastructure for each of these process participants.<\/p>\n<!-- \/wp:paragraph -->\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e3fc738 elementor-widget elementor-widget-image\" data-id=\"e3fc738\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"518\" src=\"https:\/\/www.experfy.com\/blog\/wp-content\/uploads\/2020\/06\/Untitled-7-2-1.png\" class=\"attachment-large size-large wp-image-34633\" alt=\"\" srcset=\"https:\/\/www.experfy.com\/blog\/wp-content\/uploads\/2020\/06\/Untitled-7-2-1.png 1024w, https:\/\/www.experfy.com\/blog\/wp-content\/uploads\/2020\/06\/Untitled-7-2-1-300x152.png 300w, https:\/\/www.experfy.com\/blog\/wp-content\/uploads\/2020\/06\/Untitled-7-2-1-768x389.png 768w, https:\/\/www.experfy.com\/blog\/wp-content\/uploads\/2020\/06\/Untitled-7-2-1-610x309.png 610w, https:\/\/www.experfy.com\/blog\/wp-content\/uploads\/2020\/06\/Untitled-7-2-1-750x379.png 750w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-01a8235 elementor-widget elementor-widget-heading\" data-id=\"01a8235\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><h2><strong>What measure should be taken to secure IoT devices?<\/strong><\/h2>\n<!-- \/wp:heading -->\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ac85fb7 elementor-widget elementor-widget-text-editor\" data-id=\"ac85fb7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<!-- wp:paragraph {\"fontSize\":\"medium\"} -->\n<p class=\"has-medium-font-size\"><strong><em>Manufacturer or integrator of IoT devices<\/em><\/strong><\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:list -->\n<ul>\n<li>Ensure the compliance with the minimum requirements for equipment<\/li>\n<li>Protect the IoT equipment against unlawful modifications and alterations<\/li>\n<li>Create the solution on the basis of secure equipment<\/li>\n<li>Ensure that updates are safe and secure<\/li>\n<\/ul>\n<!-- \/wp:list -->\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c5505cd elementor-widget elementor-widget-text-editor\" data-id=\"c5505cd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<!-- wp:paragraph {\"fontSize\":\"medium\"} -->\n<p class=\"has-medium-font-size\"><strong><em>IoT solution developer<\/em><\/strong><\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:list -->\n<ul>\n<li><strong>C<\/strong>hoose the safe way to develop software<\/li>\n<li>Pay special attention when selecting open-source software<\/li>\n<li>Be cautious when integrating<\/li>\n<\/ul>\n<!-- \/wp:list -->\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-785a802 elementor-widget elementor-widget-text-editor\" data-id=\"785a802\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<!-- wp:paragraph {\"fontSize\":\"medium\"} -->\n<p class=\"has-medium-font-size\"><strong><em>IoT solution deployment specialist<\/em><\/strong><\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:list -->\n<ul>\n<li>It\u2019s obvious but deploy the solution securely<\/li>\n<li>Ensure the security of authentication keys<\/li>\n<\/ul>\n<!-- \/wp:list -->\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-13b9c95 elementor-widget elementor-widget-text-editor\" data-id=\"13b9c95\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\n<!-- wp:paragraph {\"fontSize\":\"medium\"} -->\n<p class=\"has-medium-font-size\"><strong><em>IoT solution operator<\/em><\/strong><\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:list -->\n<ul>\n<li>Ensure timely updates of your system<\/li>\n<li>Take care to protect yourself against malicious activity<\/li>\n<li>Frequent audit is a must<\/li>\n<li>Ensure the physical protection of the IoT infrastructure<\/li>\n<li>Protect your cloud credentials<\/li>\n<\/ul>\n<!-- \/wp:list -->\n<!-- wp:paragraph -->\n<p>We will cover the above best practices in our upcoming article. Stay up-to-date!<\/p>\n<!-- \/wp:paragraph -->\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>One of the main security indicators of IoT devices is the ability to personalize a device without additional effort and expense (connect it to the network and enter access keys). In addition, code integrity and the ability to withstand attacks are important. Problems arise both on the part of users and manufacturers. <\/p>\n","protected":false},"author":687,"featured_media":8630,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[195],"tags":[93,287,338,350],"ppma_author":[3479],"class_list":["post-8629","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-iot","tag-internet-of-things","tag-iot","tag-iot-devices","tag-security"],"authors":[{"term_id":3479,"user_id":687,"is_guest":0,"slug":"denis-novikov","display_name":"Denis Novikov","avatar_url":"https:\/\/www.experfy.com\/blog\/wp-content\/uploads\/2020\/04\/medium_33a1908b-a1b9-4f02-907d-66acf1825947-150x150.jpg","user_url":"https:\/\/www.qulix.com\/","last_name":"Novikov","first_name":"Denis","job_title":"","description":"Denis Novikov is Deputy Director of Business Development at <a href=\"https:\/\/www.qulix.com\/\">Qulix Systems<\/a>. A representative of the StandFore FS intellectual banking platform, he is a strategy development consultant for Digital Banking products and an expert in the field of software development and implementation for financial organizations."}],"_links":{"self":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts\/8629","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/users\/687"}],"replies":[{"embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/comments?post=8629"}],"version-history":[{"count":9,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts\/8629\/revisions"}],"predecessor-version":[{"id":34636,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts\/8629\/revisions\/34636"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/media\/8630"}],"wp:attachment":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/media?parent=8629"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/categories?post=8629"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/tags?post=8629"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/ppma_author?post=8629"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}