The “HeartBleed” bug is a huge crisis for Internet Security and “The Internet of Things”.

The past 15 years of progress in the computing and internet world have been interesting. In the past 15 years, we’ve seen the creation of Google, Wikipedia, Facebook, Twitter, drones, and smartphones. Each day, the world is more and more connected in new exciting, powerful, and sometimes dangerous ways. The average person can now easily and cheaply access information and services unimaginable 15 years ago.

Surely the next 15 years are bound to be as interesting as the past 15 and likely more so. It is impossible to know exactly what the next 15 years will bring, but it’s easy to predict that increasing capabilities will be designed into new applications and devices. One can easily project the refinement of certain trends in design. For example, the continued development of the “internet of things”, and remote-controlled, or “drone” technology. Prevented unauthorized access to this “internet of things” will be one of the primary challenges of the next 15 years.

The “internet of things”, e.g. remote-controlled and remote-monitored devices, cannot thrive without a drastic improvement of security. Overcoming the challenge of preventing unwanted access and unauthorized use of remote-controlled devices will be a steep climb from where we are today in the world of security technology and practice.

Powerful technologies now allow what one can see or hear extend far beyond past limitations. These devices extend the consciousness of the user, stretching the limit of what one may listen to or see. How can unauthorized usage be prevented? And how to know if a remote device has even been compromised? How does a user know if there has been unauthorized access and control of their smart phone camera and microphone? How does the computing industry ensure to the user that their devices haven’t allowed unauthorized access?

We don’t have the answers yet but we had better find them soon, as the “Internet of Things” will demand better security implementations and practices than we have today.

© Copyright 2020 Rex Consulting, Inc. – All rights reserved