{"id":279,"date":"2017-06-12T09:12:08","date_gmt":"2017-06-12T09:12:08","guid":{"rendered":"http:\/\/localhost:8888\/beratung-1109\/?p=279"},"modified":"2018-01-05T13:58:03","modified_gmt":"2018-01-05T13:58:03","slug":"field-guide-to-iot-security","status":"publish","type":"post","link":"https:\/\/harmd.net\/ar\/2017\/06\/12\/field-guide-to-iot-security\/","title":{"rendered":"Field Guide to IoT Security"},"content":{"rendered":"<p>As a society, we\u2019re rushing into the Internet of Things (IoT) at a breakneck pace, applying it to anything and everything we can think of\u2014cars, planes, and trains, pacemakers, light bulbs, baby monitors, homes, offices, factories, nuclear power plants, electric grids, even children\u2019s dolls.<!--more--><\/p>\n<p>If something can be connected, we\u2019re connecting it. The only trouble is, we\u2019re moving to IoT faster than our ability to secure it. And IoT is not like traditional IT. It\u2019s far more vulnerable to attack. If cyber attackers get control of one of your systems, they can do far more than steal emails and credit card numbers.<\/p>\n<p>They can make the \u201cthings\u201d in the Internet of Things go wrong. Pick something in IoT, and then imagine what would happen if foreign countries, cyber criminals\u2014or just hackers looking for attention\u2014had their way with it.<\/p>\n<p>We&#8217;re simply not ready.<\/p>\n<p><iframe loading=\"lazy\" width=\"960\" height=\"540\" src=\"https:\/\/www.youtube.com\/embed\/Pl8OlkkwRpc?feature=oembed\" frameborder=\"0\" gesture=\"media\" allow=\"encrypted-media\" allowfullscreen><\/iframe><\/p>\n<p>It\u2019s like learning how to become a trapeze artist without a net, without even knowing what the net would look like. But there\u2019s no going back. As a society, we\u2019re not going to say, \u201cTime out, let\u2019s spend the next three years figuring out how to secure IoT, then we can jump back into it.\u201d<\/p>\n<p>That\u2019s not going to happen. Our headlong charge into IoT is nonstop. No one wants to miss the opportunities IoT has to offer, the new products, the new efficiencies, the promise of \u201csmart\u201d everything. No one wants to be left behind.<\/p>\n<p>And here\u2019s the rub: If you move into IoT too fast, before you\u2019ve secured it, and something does go wrong \u2013 let\u2019s say, wrong enough to make headlines \u2013 then everything you\u2019re trying to do with IoT will unravel. IoT is built on trust, and if people don\u2019t trust you, forget it.<\/p>\n<p>IoT is here, and the last thing you want to do is slow down. So the question is, Can you be in the forefront of IoT and be reasonably safe at the same time? Is it even possible?<\/p>\n<p>The short answer is yes.<\/p>\n<p>But \u2026 and there is a but \u2026 you\u2019ll have to work hard at it. You\u2019ll have to do some serious thinking and planning.<\/p>\n<p>It can be done. This field guide will show you how.<\/p>","protected":false},"excerpt":{"rendered":"<p>As a society, we\u2019re rushing into the Internet of Things (IoT) at a breakneck pace, applying it to anything and everything we can think of\u2014cars, planes, and trains, pacemakers, light bulbs, baby monitors, homes, offices, factories, nuclear power plants, electric grids, even children\u2019s dolls.<\/p>","protected":false},"author":2,"featured_media":719,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"image","meta":{"nf_dc_page":"","om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[],"tags":[2,3,13,14],"class_list":{"0":"post-279","1":"post","2":"type-post","3":"status-publish","4":"format-image","5":"has-post-thumbnail","6":"hentry","7":"tag-case-study","9":"tag-report","11":"post_format-post-format-image"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Field Guide to IoT Security - HARMD for public supplies and trade agencies<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"http:\/\/harmd.net\/ar\/2017\/06\/12\/field-guide-to-iot-security\/\" \/>\n<meta property=\"og:locale\" content=\"ar_AR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Field Guide to IoT Security - HARMD for public supplies and trade agencies\" \/>\n<meta property=\"og:description\" content=\"As a society, we\u2019re rushing into the Internet of Things (IoT) at a breakneck pace, applying it to anything and everything we can think of\u2014cars, planes, and trains, pacemakers, light bulbs, baby monitors, homes, offices, factories, nuclear power plants, electric grids, even children\u2019s dolls.\" \/>\n<meta property=\"og:url\" content=\"http:\/\/harmd.net\/ar\/2017\/06\/12\/field-guide-to-iot-security\/\" \/>\n<meta property=\"og:site_name\" content=\"HARMD for public supplies and trade agencies\" \/>\n<meta property=\"article:published_time\" content=\"2017-06-12T09:12:08+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2018-01-05T13:58:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i0.wp.com\/harmd.net\/wp-content\/uploads\/2018\/01\/two-businessmen-standing-and-shaking-hands-in-P63644B.jpg?fit=700%2C394\" \/>\n\t<meta property=\"og:image:width\" content=\"700\" \/>\n\t<meta property=\"og:image:height\" content=\"394\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u0643\u064f\u062a\u0628 \u0628\u0648\u0627\u0633\u0637\u0629\" \/>\n\t<meta name=\"twitter:data1\" content=\"\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u0648\u0642\u062a \u0627\u0644\u0642\u0631\u0627\u0621\u0629 \u0627\u0644\u0645\u064f\u0642\u062f\u0651\u0631\" \/>\n\t<meta name=\"twitter:data2\" content=\"\u062f\u0642\u064a\u0642\u062a\u0627\u0646\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"http:\\\/\\\/harmd.net\\\/ar\\\/2017\\\/06\\\/12\\\/field-guide-to-iot-security\\\/#article\",\"isPartOf\":{\"@id\":\"http:\\\/\\\/harmd.net\\\/ar\\\/2017\\\/06\\\/12\\\/field-guide-to-iot-security\\\/\"},\"author\":{\"name\":\"\",\"@id\":\"\"},\"headline\":\"Field Guide to IoT Security\",\"datePublished\":\"2017-06-12T09:12:08+00:00\",\"dateModified\":\"2018-01-05T13:58:03+00:00\",\"mainEntityOfPage\":{\"@id\":\"http:\\\/\\\/harmd.net\\\/ar\\\/2017\\\/06\\\/12\\\/field-guide-to-iot-security\\\/\"},\"wordCount\":397,\"commentCount\":0,\"image\":{\"@id\":\"http:\\\/\\\/harmd.net\\\/ar\\\/2017\\\/06\\\/12\\\/field-guide-to-iot-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/harmd.net\\\/wp-content\\\/uploads\\\/2018\\\/01\\\/two-businessmen-standing-and-shaking-hands-in-P63644B.jpg?fit=700%2C394&ssl=1\",\"keywords\":[\"Case Study\",\"Case Study\",\"Report\",\"Report\"],\"inLanguage\":\"ar\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"http:\\\/\\\/harmd.net\\\/ar\\\/2017\\\/06\\\/12\\\/field-guide-to-iot-security\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"http:\\\/\\\/harmd.net\\\/ar\\\/2017\\\/06\\\/12\\\/field-guide-to-iot-security\\\/\",\"url\":\"http:\\\/\\\/harmd.net\\\/ar\\\/2017\\\/06\\\/12\\\/field-guide-to-iot-security\\\/\",\"name\":\"Field Guide to IoT Security - HARMD for public supplies and trade agencies\",\"isPartOf\":{\"@id\":\"http:\\\/\\\/harmd.net\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"http:\\\/\\\/harmd.net\\\/ar\\\/2017\\\/06\\\/12\\\/field-guide-to-iot-security\\\/#primaryimage\"},\"image\":{\"@id\":\"http:\\\/\\\/harmd.net\\\/ar\\\/2017\\\/06\\\/12\\\/field-guide-to-iot-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/harmd.net\\\/wp-content\\\/uploads\\\/2018\\\/01\\\/two-businessmen-standing-and-shaking-hands-in-P63644B.jpg?fit=700%2C394&ssl=1\",\"datePublished\":\"2017-06-12T09:12:08+00:00\",\"dateModified\":\"2018-01-05T13:58:03+00:00\",\"author\":{\"@id\":\"\"},\"breadcrumb\":{\"@id\":\"http:\\\/\\\/harmd.net\\\/ar\\\/2017\\\/06\\\/12\\\/field-guide-to-iot-security\\\/#breadcrumb\"},\"inLanguage\":\"ar\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"http:\\\/\\\/harmd.net\\\/ar\\\/2017\\\/06\\\/12\\\/field-guide-to-iot-security\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ar\",\"@id\":\"http:\\\/\\\/harmd.net\\\/ar\\\/2017\\\/06\\\/12\\\/field-guide-to-iot-security\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/harmd.net\\\/wp-content\\\/uploads\\\/2018\\\/01\\\/two-businessmen-standing-and-shaking-hands-in-P63644B.jpg?fit=700%2C394&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/harmd.net\\\/wp-content\\\/uploads\\\/2018\\\/01\\\/two-businessmen-standing-and-shaking-hands-in-P63644B.jpg?fit=700%2C394&ssl=1\",\"width\":700,\"height\":394},{\"@type\":\"BreadcrumbList\",\"@id\":\"http:\\\/\\\/harmd.net\\\/ar\\\/2017\\\/06\\\/12\\\/field-guide-to-iot-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"http:\\\/\\\/harmd.net\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Field Guide to IoT Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"http:\\\/\\\/harmd.net\\\/#website\",\"url\":\"http:\\\/\\\/harmd.net\\\/\",\"name\":\"HARMD for public supplies and trade agencies\",\"description\":\"HARMD for public supplies and trade agencies\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"http:\\\/\\\/harmd.net\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ar\"},{\"@type\":\"Person\",\"@id\":\"\",\"url\":\"https:\\\/\\\/harmd.net\\\/ar\\\/author\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Field Guide to IoT Security - HARMD for public supplies and trade agencies","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"http:\/\/harmd.net\/ar\/2017\/06\/12\/field-guide-to-iot-security\/","og_locale":"ar_AR","og_type":"article","og_title":"Field Guide to IoT Security - HARMD for public supplies and trade agencies","og_description":"As a society, we\u2019re rushing into the Internet of Things (IoT) at a breakneck pace, applying it to anything and everything we can think of\u2014cars, planes, and trains, pacemakers, light bulbs, baby monitors, homes, offices, factories, nuclear power plants, electric grids, even children\u2019s dolls.","og_url":"http:\/\/harmd.net\/ar\/2017\/06\/12\/field-guide-to-iot-security\/","og_site_name":"HARMD for public supplies and trade agencies","article_published_time":"2017-06-12T09:12:08+00:00","article_modified_time":"2018-01-05T13:58:03+00:00","og_image":[{"width":700,"height":394,"url":"https:\/\/i0.wp.com\/harmd.net\/wp-content\/uploads\/2018\/01\/two-businessmen-standing-and-shaking-hands-in-P63644B.jpg?fit=700%2C394","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"\u0643\u064f\u062a\u0628 \u0628\u0648\u0627\u0633\u0637\u0629":"","\u0648\u0642\u062a \u0627\u0644\u0642\u0631\u0627\u0621\u0629 \u0627\u0644\u0645\u064f\u0642\u062f\u0651\u0631":"\u062f\u0642\u064a\u0642\u062a\u0627\u0646"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"http:\/\/harmd.net\/ar\/2017\/06\/12\/field-guide-to-iot-security\/#article","isPartOf":{"@id":"http:\/\/harmd.net\/ar\/2017\/06\/12\/field-guide-to-iot-security\/"},"author":{"name":"","@id":""},"headline":"Field Guide to IoT Security","datePublished":"2017-06-12T09:12:08+00:00","dateModified":"2018-01-05T13:58:03+00:00","mainEntityOfPage":{"@id":"http:\/\/harmd.net\/ar\/2017\/06\/12\/field-guide-to-iot-security\/"},"wordCount":397,"commentCount":0,"image":{"@id":"http:\/\/harmd.net\/ar\/2017\/06\/12\/field-guide-to-iot-security\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/harmd.net\/wp-content\/uploads\/2018\/01\/two-businessmen-standing-and-shaking-hands-in-P63644B.jpg?fit=700%2C394&ssl=1","keywords":["Case Study","Case Study","Report","Report"],"inLanguage":"ar","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["http:\/\/harmd.net\/ar\/2017\/06\/12\/field-guide-to-iot-security\/#respond"]}]},{"@type":"WebPage","@id":"http:\/\/harmd.net\/ar\/2017\/06\/12\/field-guide-to-iot-security\/","url":"http:\/\/harmd.net\/ar\/2017\/06\/12\/field-guide-to-iot-security\/","name":"Field Guide to IoT Security - HARMD for public supplies and trade agencies","isPartOf":{"@id":"http:\/\/harmd.net\/#website"},"primaryImageOfPage":{"@id":"http:\/\/harmd.net\/ar\/2017\/06\/12\/field-guide-to-iot-security\/#primaryimage"},"image":{"@id":"http:\/\/harmd.net\/ar\/2017\/06\/12\/field-guide-to-iot-security\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/harmd.net\/wp-content\/uploads\/2018\/01\/two-businessmen-standing-and-shaking-hands-in-P63644B.jpg?fit=700%2C394&ssl=1","datePublished":"2017-06-12T09:12:08+00:00","dateModified":"2018-01-05T13:58:03+00:00","author":{"@id":""},"breadcrumb":{"@id":"http:\/\/harmd.net\/ar\/2017\/06\/12\/field-guide-to-iot-security\/#breadcrumb"},"inLanguage":"ar","potentialAction":[{"@type":"ReadAction","target":["http:\/\/harmd.net\/ar\/2017\/06\/12\/field-guide-to-iot-security\/"]}]},{"@type":"ImageObject","inLanguage":"ar","@id":"http:\/\/harmd.net\/ar\/2017\/06\/12\/field-guide-to-iot-security\/#primaryimage","url":"https:\/\/i0.wp.com\/harmd.net\/wp-content\/uploads\/2018\/01\/two-businessmen-standing-and-shaking-hands-in-P63644B.jpg?fit=700%2C394&ssl=1","contentUrl":"https:\/\/i0.wp.com\/harmd.net\/wp-content\/uploads\/2018\/01\/two-businessmen-standing-and-shaking-hands-in-P63644B.jpg?fit=700%2C394&ssl=1","width":700,"height":394},{"@type":"BreadcrumbList","@id":"http:\/\/harmd.net\/ar\/2017\/06\/12\/field-guide-to-iot-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"http:\/\/harmd.net\/"},{"@type":"ListItem","position":2,"name":"Field Guide to IoT Security"}]},{"@type":"WebSite","@id":"http:\/\/harmd.net\/#website","url":"http:\/\/harmd.net\/","name":"HARMD for public supplies and trade agencies","description":"HARMD for public supplies and trade agencies","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"http:\/\/harmd.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ar"},{"@type":"Person","@id":"","url":"https:\/\/harmd.net\/ar\/author\/"}]}},"jetpack_featured_media_url":"https:\/\/i0.wp.com\/harmd.net\/wp-content\/uploads\/2018\/01\/two-businessmen-standing-and-shaking-hands-in-P63644B.jpg?fit=700%2C394&ssl=1","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/harmd.net\/ar\/wp-json\/wp\/v2\/posts\/279","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/harmd.net\/ar\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/harmd.net\/ar\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/harmd.net\/ar\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/harmd.net\/ar\/wp-json\/wp\/v2\/comments?post=279"}],"version-history":[{"count":0,"href":"https:\/\/harmd.net\/ar\/wp-json\/wp\/v2\/posts\/279\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/harmd.net\/ar\/wp-json\/wp\/v2\/media\/719"}],"wp:attachment":[{"href":"https:\/\/harmd.net\/ar\/wp-json\/wp\/v2\/media?parent=279"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/harmd.net\/ar\/wp-json\/wp\/v2\/categories?post=279"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/harmd.net\/ar\/wp-json\/wp\/v2\/tags?post=279"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}