Abusing the Internet of Things

(Rick Simeone) #1

The consideration of how to secure an IoT device includes context, such as how the prod-
uct may be used, and what types of threat agents are likely to abuse it for malicious purposes.
For example, a sophisticated gang of terrorists may want to gain and maintain access to IoT
devices that serve critical infrastructure, such as connected cars and lighting systems. On the
other hand, threat agents such as cyberbullies are likely to abuse device functionalities to har-
ass others. In this chapter we will step through designing a prototype and begin to formulate
our thinking around security controls that leverage use cases and the intentions of potential
threat agents.


Introducing the cloudBit Starter Kit


The cloudBit Starter Kit is a great way to start tinkering with IoT product ideas that require
remote connectivity (i.e., communication via the Internet). It is a simple and elegant kit that
can be used to brainstorm the feasibility of ideas and test out use cases prior to expending too
much effort on a full-blown solution. The kit consists of five prototyping modules and a USB
power module (Figure 7-1).


FIGURE 7-1. The USB power module


190 CHAPTER 7: SECURE PROTOTYPING—LITTLEBITS AND CLOUDBIT
Free download pdf