The transition from closed networks to enterprise IT networks to the public Internet is accelerating at an alarming pace-and justly raising alarms about security. As we become increasingly reliant on intelligent, interconnected devices in every aspect of our lives, how do we protect potentially billions of them from intrusions and interference that could compromise personal privacy or threaten public safety?
This discussion will highlight which means there are to protect IoT devices from unauthorized access, use, disclosure, disruption, modification, or even destruction. The base foundation for this kind of security is the CIA triad, composed of the following three pillars: confidentiality, integrity and availability. Confidentiality for preserving authorized restrictions on access and disclosure; integrity for guarding against improper information modification or destruction and ensuring information nonrepudiation and authenticity; and availability for ensuring timely and reliable access to the device and information.