Author_Institution :
Security Intell. Oper., Cisco Syst., Inc., San Francisco, CA, USA
Abstract :
There are currently more objects connected to the Internet than there are people in the world. This gap will continue to grow, as more objects gain the ability to directly interface with the Internet or become physical representations of data accessible via Internet systems. This trend toward greater independent object interaction in the Internet is collectively described as the Internet of Things (IoT). As with previous global technology trends, such as widespread mobile adoption and datacentre consolidation, the changing operating environment associated with the Internet of Things represents considerable impact to the attack surface and threat environment of the Internet and Internet-connected systems. The increase in Internet-connected systems and the accompanying, non-linear increase in Internet attack surface can be represented by several tiers of increased surface complexity. Users, or groups of users, are linked to a non-linear number of connected entities, which in turn are linked to a non-linear number of indirectly connected, trackable entities. At each tier of this model, the increasing population, complexity, heterogeneity, interoperability, mobility, and distribution of entities represents an expanding attack surface, measurable by additional channels, methods, and data items. Further, this expansion will necessarily increase the field of security stakeholders and introduce new manageability challenges. This document provides a framework for measurement and analysis of the security implications inherent in an Internet that is dominated by non-user endpoints, content in the form of objects, and content that is generated by objects without direct user involvement.
Keywords :
Internet of Things; computational complexity; computer centres; mobile computing; security of data; Internet attack surface; Internet of things; Internet systems; Internet-connected systems; IoT; data items; datacentre consolidation; independent object interaction; manageability challenges; mobile adoption; security implications; security stakeholders; surface complexity; Complexity theory; Internet; Interoperability; Market research; Security; Sociology; Statistics; Internet of Things; attack surface; security intelligence; threat evolution;