Skip to main content
  • Sections
  • Search

Center for Strategic & International Studies

User menu

  • Subscribe
  • Sign In

   Ranked #1 Think Tank in U.S. by Global Go To Think Tank Index

Topics

  • Climate Change
  • Cybersecurity and Technology
    • Cybersecurity
    • Data Governance
    • Intelligence, Surveillance, and Privacy
    • Military Technology
    • Space
    • Technology and Innovation
  • Defense and Security
    • Counterterrorism and Homeland Security
    • Defense Budget
    • Defense Industry, Acquisition, and Innovation
    • Defense Strategy and Capabilities
    • Geopolitics and International Security
    • Long-Term Futures
    • Missile Defense
    • Space
    • Weapons of Mass Destruction Proliferation
  • Economics
    • Asian Economics
    • Global Economic Governance
    • Trade and International Business
  • Energy and Sustainability
    • Energy, Climate Change, and Environmental Impacts
    • Energy and Geopolitics
    • Energy Innovation
    • Energy Markets, Trends, and Outlooks
  • Global Health
    • Family Planning, Maternal and Child Health, and Immunizations
    • Multilateral Institutions
    • Health and Security
    • Infectious Disease
  • Human Rights
    • Civil Society
    • Transitional Justice
    • Human Security
  • International Development
    • Food and Agriculture
    • Governance and Rule of Law
    • Humanitarian Assistance
    • Private Sector Development
    • U.S. Development Policy

Regions

  • Africa
    • North Africa
    • Sub-Saharan Africa
  • Americas
    • Caribbean
    • North America
    • South America
  • Arctic
  • Asia
    • Afghanistan
    • Australia, New Zealand & Pacific
    • China
    • India
    • Japan
    • Korea
    • Pakistan
    • Southeast Asia
  • Europe
    • European Union
    • NATO
    • Post-Soviet Europe
    • Turkey
  • Middle East
    • The Gulf
    • Egypt and the Levant
    • North Africa
  • Russia and Eurasia
    • The South Caucasus
    • Central Asia
    • Post-Soviet Europe
    • Russia

Sections menu

  • Programs
  • Experts
  • Events
  • Analysis
    • Blogs
    • Books
    • Commentary
    • Congressional Testimony
    • Critical Questions
    • Interactive Reports
    • Journals
    • Newsletter
    • Reports
    • Transcript
  • Podcasts
  • iDeas Lab
  • Transcripts
  • Web Projects

Main menu

  • About Us
  • Support CSIS
    • Securing Our Future
Blog Post - Technology Policy Blog
Share
  • LinkedIn
  • Facebook
  • Twitter
  • Email
  • Printfriendly.com

Managing Risk for the Internet of Things

February 17, 2016

New CSIS Report - Managing Risk for the Internet of Things: Executive Summary https://csis.org/publication/managing-risk-internet-things.

The majority of Internet “users” are machines, not people.  The devices that make up “the Internet of Things” (IoT) connect to the internet, take action, and create immense amounts of data. These devices will perform progressively more functions, creating new risks for safety and security, but we need more than anecdotes to assess risk and devise useful policies.  An initial conclusion about security and the Internet of things is that popular portrayal significantly exaggerates and misrepresents risk. 

·         The Internet of Things will be no more secure than the conventional Internet and may be more vulnerable, since many IoT devices will use simple computers with limited functionality.

·         Increased vulnerability, however, does not mean an increased risk. The benefits of IoT outweigh the potential for harm, and one risk usually not considered is that premature or overreaching measures for security or privacy will stifle economic growth and innovation.

·         IoT devices allow hackers to produce physical effects. Researchers have demonstrated many vulnerabilities in IoT devices, but the consequences of these vulnerabilities largely qualify as malicious pranks. Only IoT devices that perform sensitive functions or where disruption can produce mass effect will increase risk. This means most IoT devices pose little risk.

·         The state of online privacy is so dreadful it is unlikely that IoT will make it worse.

·         The same problems that keep us from making cyberspace more secure will slow progress in IoT security: technological uncertainty, limited international cooperation, lack of incentives for improvement, limited regulatory authority, weak online identities, and an Internet business model based on exploitation of personal data.

·         We can accelerate risk reduction with the same approaches we use for general cybersecurity: research, liability, international cooperation, and regulation. The White House could repeat its approach to critical infrastructure and task sector-specific agencies to work with companies to improve the security of IoT devices they use or sell.

·         Autonomy will be a key determinant for IoT risk. Limiting device autonomy or providing a way to override autonomy reduces risk. IoT standards should require a higher degree of human intervention and control for sensitive functions.

·         A secure device connecting to an unsecured network does little to reduce risk. Given the weak state of security on most networks, making IoT more secure requires better use of encryption, strong authentication, and increased resilience for both devices and networks.

·         We can use three metrics—the value of data, the criticality of a function, and scalability of failure—we can assess IoT risk. Devices that create valuable data, perform crucial functions, or can produce mass effect need to be held to higher standards. Those that do not can be left to market forces and the courts to correct.

·         Risk is dynamic. It decreases as technology matures and as familiarity and experience grow. As we gain experience with IoT, risk will decrease. 
 

Image Credit: www.perspecsys.com
Written By
James Andrew Lewis
Senior Vice President and Director, Strategic Technologies Program
Media Queries

Contact H. Andrew Schwartz
Chief Communications Officer
Tel: 202.775.3242

Contact Caleb Diamond
Media Relations Manager and Editorial Associate
Tel: 202.775.3173

More from this blog

Blog Post
The Evolving Role of Artificial Intelligence and Machine Learning in US Politics
In Technology Policy Blog
December 21, 2020
Blog Post
No One is Immune: The Spread of Q-anon Through Social Media and the Pandemic
In Technology Policy Blog
December 17, 2020
Blog Post
Assessing the Impact of U.S.-China Technology Competition and Decoupling: Focusing on 5G
In Technology Policy Blog
December 16, 2020
Blog Post
Covid-19 and the Trajectory of US Venture Capital and Technology Innovation
In Technology Policy Blog
December 3, 2020
Blog Post
Managing U.S.-China Technology Competition and Decoupling
In Technology Policy Blog
November 24, 2020
Blog Post
Applications of Synthetic Aperture Radar Satellites to Environmental Monitoring
In Technology Policy Blog
November 9, 2020
Blog Post
The Goldilocks Porridge Problem with Section 230
By Zhanna Malekos Smith
In Technology Policy Blog
November 3, 2020
Blog Post
Notes from a CSIS Virtual Event: Innovation in the Intelligence Community
In Technology Policy Blog
October 20, 2020

Related Content

Blog Post
Did Russia Influence Brexit?
By Rachel Ellehuus, Donatienne Ruy
In Brexit Bits, Bobs, and Blogs
July 21, 2020
Report
Creating an Expectation of Service: Civic Education as a National Security Imperative (Testimony)
By Suzanne Spaulding
July 10, 2019
Transcript
Mitigating Security Risks to Emerging 5G Networks
February 6, 2019
Blog Post
American Business Confidence in Hong Kong Sinks
By Shining Tan
In Trustee China Hand
July 22, 2020
Blog Post
Can China’s “Stall Economy” Save Its Stalled Economy?
By Shining Tan
In Trustee China Hand
June 24, 2020
Newsletter
RESOLVED: Japan Could Lead Global Efforts on Data Governance
June 27, 2019
Report
Video Conferencing Technology and Risk
By James Andrew Lewis
December 3, 2020
On Demand Event
Online Event: Optimizing U.S. Global Pandemic Response
June 2, 2020
Footer menu
  • Topics
  • Regions
  • Programs
  • Experts
  • Events
  • Analysis
  • Web Projects
  • Podcasts
  • iDeas Lab
  • Transcripts
  • About Us
  • Support Us
Contact CSIS
Email CSIS
Tel: 202.887.0200
Fax: 202.775.3199
Visit CSIS Headquarters
1616 Rhode Island Avenue, NW
Washington, DC 20036
Media Queries

Contact H. Andrew Schwartz
Chief Communications Officer
Tel: 202.775.3242

Contact Caleb Diamond
Media Relations Manager and Editorial Associate
Tel: 202.775.3173

Daily Updates

Sign up to receive The Evening, a daily brief on the news, events, and people shaping the world of international affairs.

Subscribe to CSIS Newsletters

Follow CSIS
  • Facebook
  • Twitter
  • LinkedIn
  • YouTube
  • Instagram

All content © 2020. All rights reserved.

Legal menu
  • Credits
  • Privacy Policy
  • Reprint Permissions