• Guest
HabraHabr
  • Main
  • Users

  • Development
    • Programming
    • Information Security
    • Website development
    • JavaScript
    • Game development
    • Open source
    • Developed for Android
    • Machine learning
    • Abnormal programming
    • Java
    • Python
    • Development of mobile applications
    • Analysis and design of systems
    • .NET
    • Mathematics
    • Algorithms
    • C#
    • System Programming
    • C++
    • C
    • Go
    • PHP
    • Reverse engineering
    • Assembler
    • Development under Linux
    • Big Data
    • Rust
    • Cryptography
    • Entertaining problems
    • Testing of IT systems
    • Testing Web Services
    • HTML
    • Programming microcontrollers
    • API
    • High performance
    • Developed for iOS
    • CSS
    • Industrial Programming
    • Development under Windows
    • Image processing
    • Compilers
    • FPGA
    • Professional literature
    • OpenStreetMap
    • Google Chrome
    • Data Mining
    • PostgreSQL
    • Development of robotics
    • Visualization of data
    • Angular
    • ReactJS
    • Search technologies
    • Debugging
    • Test mobile applications
    • Browsers
    • Designing and refactoring
    • IT Standards
    • Solidity
    • Node.JS
    • Git
    • LaTeX
    • SQL
    • Haskell
    • Unreal Engine
    • Unity3D
    • Development for the Internet of things
    • Functional Programming
    • Amazon Web Services
    • Google Cloud Platform
    • Development under AR and VR
    • Assembly systems
    • Version control systems
    • Kotlin
    • R
    • CAD/CAM
    • Customer Optimization
    • Development of communication systems
    • Microsoft Azure
    • Perfect code
    • Atlassian
    • Visual Studio
    • NoSQL
    • Yii
    • Mono и Moonlight
    • Parallel Programming
    • Asterisk
    • Yandex API
    • WordPress
    • Sports programming
    • Lua
    • Microsoft SQL Server
    • Payment systems
    • TypeScript
    • Scala
    • Google API
    • Development of data transmission systems
    • XML
    • Regular expressions
    • Development under Tizen
    • Swift
    • MySQL
    • Geoinformation services
    • Global Positioning Systems
    • Qt
    • Dart
    • Django
    • Development for Office 365
    • Erlang/OTP
    • GPGPU
    • Eclipse
    • Maps API
    • Testing games
    • Browser Extensions
    • 1C-Bitrix
    • Development under e-commerce
    • Xamarin
    • Xcode
    • Development under Windows Phone
    • Semantics
    • CMS
    • VueJS
    • GitHub
    • Open data
    • Sphinx
    • Ruby on Rails
    • Ruby
    • Symfony
    • Drupal
    • Messaging Systems
    • CTF
    • SaaS / S+S
    • SharePoint
    • jQuery
    • Puppet
    • Firefox
    • Elm
    • MODX
    • Billing systems
    • Graphical shells
    • Kodobred
    • MongoDB
    • SCADA
    • Hadoop
    • Gradle
    • Clojure
    • F#
    • CoffeeScript
    • Matlab
    • Phalcon
    • Development under Sailfish OS
    • Magento
    • Elixir/Phoenix
    • Microsoft Edge
    • Layout of letters
    • Development for OS X
    • Forth
    • Smalltalk
    • Julia
    • Laravel
    • WebGL
    • Meteor.JS
    • Firebird/Interbase
    • SQLite
    • D
    • Mesh-networks
    • I2P
    • Derby.js
    • Emacs
    • Development under Bada
    • Mercurial
    • UML Design
    • Objective C
    • Fortran
    • Cocoa
    • Cobol
    • Apache Flex
    • Action Script
    • Joomla
    • IIS
    • Twitter API
    • Vkontakte API
    • Facebook API
    • Microsoft Access
    • PDF
    • Prolog
    • GTK+
    • LabVIEW
    • Brainfuck
    • Cubrid
    • Canvas
    • Doctrine ORM
    • Google App Engine
    • Twisted
    • XSLT
    • TDD
    • Small Basic
    • Kohana
    • Development for Java ME
    • LiveStreet
    • MooTools
    • Adobe Flash
    • GreaseMonkey
    • INFOLUST
    • Groovy & Grails
    • Lisp
    • Delphi
    • Zend Framework
    • ExtJS / Sencha Library
    • Internet Explorer
    • CodeIgniter
    • Silverlight
    • Google Web Toolkit
    • CakePHP
    • Safari
    • Opera
    • Microformats
    • Ajax
    • VIM
  • Administration
    • System administration
    • IT Infrastructure
    • *nix
    • Network technologies
    • DevOps
    • Server Administration
    • Cloud computing
    • Configuring Linux
    • Wireless technologies
    • Virtualization
    • Hosting
    • Data storage
    • Decentralized networks
    • Database Administration
    • Data Warehousing
    • Communication standards
    • PowerShell
    • Backup
    • Cisco
    • Nginx
    • Antivirus protection
    • DNS
    • Server Optimization
    • Data recovery
    • Apache
    • Spam and antispam
    • Data Compression
    • SAN
    • IPv6
    • Fidonet
    • IPTV
    • Shells
    • Administering domain names
  • Design
    • Interfaces
    • Web design
    • Working with sound
    • Usability
    • Graphic design
    • Design Games
    • Mobile App Design
    • Working with 3D-graphics
    • Typography
    • Working with video
    • Work with vector graphics
    • Accessibility
    • Prototyping
    • CGI (graphics)
    • Computer Animation
    • Working with icons
  • Control
    • Careers in the IT industry
    • Project management
    • Development Management
    • Personnel Management
    • Product Management
    • Start-up development
    • Managing the community
    • Service Desk
    • GTD
    • IT Terminology
    • Agile
    • Business Models
    • Legislation and IT-business
    • Sales management
    • CRM-systems
    • Product localization
    • ECM / EDS
    • Freelance
    • Venture investments
    • ERP-systems
    • Help Desk Software
    • Media management
    • Patenting
    • E-commerce management
    • Creative Commons
  • Marketing
    • Conferences
    • Promotion of games
    • Internet Marketing
    • Search Engine Optimization
    • Web Analytics
    • Monetize Web services
    • Content marketing
    • Monetization of IT systems
    • Monetize mobile apps
    • Mobile App Analytics
    • Growth Hacking
    • Branding
    • Monetize Games
    • Display ads
    • Contextual advertising
    • Increase Conversion Rate
  • Sundry
    • Reading room
    • Educational process in IT
    • Research and forecasts in IT
    • Finance in IT
    • Hakatonas
    • IT emigration
    • Education abroad
    • Lumber room
    • I'm on my way

"S in IoT Stands for Security": the world's first law on the protection of smart gadgets was adopted - we understand what the essence

In California, accepted 3r3203. Law SB-327 on the security of IoT devices. It obliges smart system developers to create for them a unique login-password pair. The document has already been given for signature to the state governor. We talk about the opinion of the community and the impact of the new law on the development of the industry. 3r3182.  
3r3182.  
3r311.
Al King / CC [/i]
3r3182.  
3r3182.  

What is the essence of

3r3182.  
Document 3r3333. SB-327
, which is called "Information security: connected devices", developed 3r3203. California senators since last February. In this case, “connected devices” refers to all gadgets that have an internet connection, IP address or Bluetooth. 3r3182.  
3r3182.  
Senator Hannah-Beth Jackson (Hannah-Beth Jackson), who is the author of the bill,
says
that such a law should have appeared a long time ago. According to her, ordinary consumers are rarely interested in the security issues of the gadgets they acquire, because developers are not in a hurry to fix security vulnerabilities. 3r3182.  
3r3182.  
Of particular importance is the problem in the case of children's toys. As an example, in additions to the bill, senators cite the situation with the My Friend Cayla dolls (3r3347. Senate Floor Analyzes document dated ??? number 3r?203.). They know how to communicate with children and forward the records to the manufacturer’s servers, for example, to analyze a question and find an answer to it. This creates a potential vulnerability for a child’s personal data. For this reason, in Germany in general, 3r3-349. banned the sale
such dolls. 3r3182.  
3r3182.  
The basic requirement of California law 3r3355. lies
in that every IoT device manufacturer will need to provide their gadgets with “appropriate security features”. The degree of protection depends on the function of the device and the information it uses and transmits. 3r3182.  
3r3182.  
The law does not say what is meant by “proper protection”, but the requirements for authentication mechanisms are spelled out. If a connected device has access to the Internet, then its authentication system must satisfy one of two criteria. The first is that the manufacturer creates unique combinations of username and password for each individual device. The second - the developer obliges the buyer to change the standard factory data to enter when you first use the equipment. 3r3182.  
3r3182.  
All companies that manufacture or sell IoT devices in California fall under the law. SB-327 will enter into force on January ? 2020. 3r3182.  
3r3182.  

Opinions on the law 3r3134. 3r3182.  
New law met ambiguously. Some users and experts agreed that banning standard passwords at least a little, but will increase the security of IoT devices. However, the lack of other specific requirements for manufacturers confused the community. 3r3182.  
3r3182.  
3r3117. Cyber ​​Security Specialists [/b] passed the law skeptically. One of the main critics was Robert Graham (Robert Graham), an expert on cybersecurity at Errata Security. Robert 3r379. Writes
that the wording about “remedies” is too vague, so it will be difficult for organizations to determine the criteria for meeting the requirements of the act. 3r3182.  
3r3182.  
Moreover, it is impossible to indicate in the law how to counter specific threats, because new types of attacks appear constantly. Graham believes that the ways to protect IoT cannot be defined in the legislation, and the SB-327 will only lead to an increase in the cost of producing smart devices. 3r3182.  
3r3182.  
The law is useless and on opinion Product Vice President Armis Joe Lee (Joe Lea). His company is creating a platform to protect IoT networks. According to Joe, the security of the Internet of Things is a complex industry that is not limited to password issues for devices. 3r3182.  
3r3182.  
A number of security experts supported the new bill. One of these people was Bo Woods (Beau Woods), a security specialist at the think-tank of the Atlantic Council. By its According to 3r3203. , vague wording in legislation is intentionally used. This will allow companies to develop their own device protection requirements. 3r3182.  
3r3182.  
Many experts believe that even an imperfect law is better than its absence. Author of books on cybersecurity and cryptographer Bruce Schneier
said
That SB-327 is a step in the right direction, although this document is not enough to fully regulate IoT. 3r3182.  
3r3182.  
3r3151. “The law should help solve the problem of unauthorized access to devices. However, it is not a panacea, - commented the head of the department for development of infrastructure rental services in the cloud 3r3109. 1cloud.ru
Sergey Belkin. - Unique and strong passwords should make it difficult to hack smart gadgets using a trivial dictionary search. However, there are many other ways to gain access to the device, for example DNS reassignment . More than half a billion IoT devices worldwide are subject to this type of attack. ” [/i] 3r3114. 3r3182.  
3r3117. Users [/b] in general, support the initiative of the government of California. Residents of Hacker News celebrate that manufacturers' passwords may be too predictable and coincide with the serial number. But this solution is better than the standard password for all devices of the same model. 3r3182.  
3r3182.  
Some users find the law meaningless. Slashdot commentator. pointed that, most often, problems with the security of IoT-devices are not solved by changing the password and are associated with vulnerabilities in the firmware and software modules. For example, in 201? the bug discovered in the gSOAP library, which is used by manufacturers of IoT devices. During the demonstration, security specialists hacked a home camera and got an image from it. 3r3182.  
3r3182.  
Who else is making laws for IoT

3r3182.  
Laws on the protection of the Internet of things works not only California. Over the past year, the United States Congress has made several projects on this topic. Among them are the Securing IoT Act of 2017 and the Internet of Things Cybersecurity Improvement Act of 201? which require federal agencies to develop standard security requirements for IoT devices. 3r3182.  
3r3182.  
Prior to this, the US government issued guidelines for manufacturers of smart devices, which collected recommendations on the protection of personal data of users. For example, such 3r3141. Document 3r3203. in 2015 published the Federal Trade Commission (FTC). 3r3182.  
3r3182.  
3r3147. 3r3182.  
3r33150. 3r3151. /Flickr / coniferconifer / CC [/i]
3r3182.  
3r3182.  
In Europe, too, there are similar documents, in particular, 3r3162. Directive 3r3203. Network Security and Information Systems (NIS Directive), adopted in July 2016. It does not concern the Internet of things directly, but it does establish requirements for the protection of companies' systems in critical areas: energy, finance, health care, and the transport industry. The document contains only a list of rules, and each EU state should independently determine the methods for their implementation. 3r3182.  
3r3182.  
IoT Device Protection Act developing and the australian government. According to politicians, they seek to create a balanced document that will protect consumers and will not limit innovation in the IoT. For this, the regulator conducts a dialogue with representatives of the industry. For now politicians are only discussing requirements for manufacturers of smart devices. 3r3182.  
3r3182.  
Thus, California law was the first to formulate general requirements for all manufacturers of IoT devices. And although it is not ideal, There is an opinion 3r3203. that the directive will become a guideline for other countries and will initiate active work on the security of smart gadgets. 3r3182.  
3r3182.  
3r33180. Some fresh material from our corporate blog:
3r3182.  
3r3184.  
3r3187. DevOps in the cloud service: analyze the approach on the example of 1cloud.ru
3r3204.  
3r3192. Risk minimization: how not to lose your data 3r3203. 3r3204.  
3r3197. “About personal data”: what is the essence of the FZ-152?
3r3204.  
3r3202. Personal dаta: how to protect them
3r3204.  

It may be interesting

  • Comments
  • About article
  • Similar news
This publication has no comments.

weber

Author

18-10-2018, 12:34

Publication Date

Development / Programming

Category
  • Comments: 0
  • Views: 251
mRemoteNG again cake
How to run SQL Profiler Trace at night,
What we learned about Intel ME security
Connect phpStorm tasks to Bitrix24
Educational program for working with
California prohibits the sale of
Write a comment
Name:*
E-Mail:


Comments
Wow Tastic UK offers a huge range of toys, presents, and gadgets for kids and adults. Discover our great range of fun and unusual toys for baby and toddlers. Check Out: Gadgets for Kids
Today, 19:21

noorseo

Nice information, valuable and excellent design, as share good stuff with good ideas and concepts, lots of great information and inspiraopencarttion, both of which I need, thanks to offer such a helpful information here.

Awesome blog. I enjoyed reading your articles. This is truly a great read for me. I have bookmarked it and I am looking forward to reading new articles. Keep up the good work!
메리트카지노

Really nice and interesting post. I was looking for this kind of information and enjoyed reading this one. Keep posting. Thanks for sharing.

메리트카지노
Today, 18:33

taxiseo2

This is a wonderful article, Given so much info in it, These type of articles keeps the users interest in the website, and keep on sharing more ... good luck.

opencart eticaret

This is a wonderful article, Given so much info in it, These type of articles keeps the users interest in the website, and keep on sharing more ... good luck.

메리트카지노
Today, 18:27

taxiseo2

I really loved reading your blog. It was very well authored and easy to undertand. Unlike additional blogs I have read which are really not tht good. I also found your posts very interesting. In fact after reading. I had to go show it to my friend and he ejoyed it as well!seo toronto



Hey what a brilliant post I have come across and believe me I have been searching out for this similar kind of post for past a week and hardly came across this. Thank you very much and will look for more postings from you. [Url = https: //mtsoul.net] 먹튀 검증 [/ url]

Today, 16:41

raymond weber

I recently came across your blog and have been reading along. I thought I would leave my first comment. I don't know what to say except that I have enjoyed reading. Nice blog. I will keep visiting this blog very often.먹튀검증

Today, 15:58

raymond weber

Adv
Website for web developers. New scripts, best ideas, programming tips. How to write a script for you here, we have a lot of information about various programming languages. You are a webmaster or a beginner programmer, it does not matter, useful articles will help to make your favorite business faster.

Login

Registration Forgot password