{"id":13030,"date":"2019-07-02T14:00:55","date_gmt":"2019-07-02T13:00:55","guid":{"rendered":"https:\/\/www.engineernewsnetwork.com\/blog\/?p=13030"},"modified":"2019-07-03T09:37:26","modified_gmt":"2019-07-03T08:37:26","slug":"a-one-size-fits-all-approach-will-not-be-enough-to-secure-the-iot","status":"publish","type":"post","link":"https:\/\/www.engineernewsnetwork.com\/blog\/a-one-size-fits-all-approach-will-not-be-enough-to-secure-the-iot\/","title":{"rendered":"A one-size-fits-all approach &#8216;will not be enough to secure the IoT&#8217;"},"content":{"rendered":"\n<p>Securing the Internet of Things (IoT) is something which cannot be done with a one-size-fits-all approach \u2013 and every kind of connected object must be assessed individually, the Co-chair of <strong><a rel=\"noreferrer noopener\" aria-label=\"Trusted Computing Group (opens in a new tab)\" href=\"https:\/\/trustedcomputinggroup.org\/\" target=\"_blank\">Trusted Computing Group<\/a><\/strong>\u2019s (TCG) Embedded Systems Work Group said.<\/p>\n\n\n\n<p>Speaking on the second day of Embedded Technologies Expo and Conference 2019, San Jose, California, Steve Hanna highlighted how the growing trend for greater connectivity puts everyday objects at risk of exploitation and makes mission critical systems in businesses and Governments more vulnerable to attacks.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"897\" src=\"https:\/\/www.engineernewsnetwork.com\/blog\/wp-content\/uploads\/2019\/06\/TCP-Image01-1024x897.jpg\" alt=\"A one-size-fits-all approach 'will not be enough to secure the IoT'\" class=\"wp-image-13031\" srcset=\"https:\/\/www.engineernewsnetwork.com\/blog\/wp-content\/uploads\/2019\/06\/TCP-Image01-1024x897.jpg 1024w, https:\/\/www.engineernewsnetwork.com\/blog\/wp-content\/uploads\/2019\/06\/TCP-Image01-300x263.jpg 300w, https:\/\/www.engineernewsnetwork.com\/blog\/wp-content\/uploads\/2019\/06\/TCP-Image01-768x673.jpg 768w, https:\/\/www.engineernewsnetwork.com\/blog\/wp-content\/uploads\/2019\/06\/TCP-Image01-800x701.jpg 800w, https:\/\/www.engineernewsnetwork.com\/blog\/wp-content\/uploads\/2019\/06\/TCP-Image01.jpg 1175w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption>Steve Hanna, Co-chair of TCG\u2019s Embedded Systems Work Group<\/figcaption><\/figure>\n\n\n\n<p>And while securing the IoT is often referred to as a singular movement, Hanna emphasised that every device had to be handled according to its individual needs, warning that there would be no single method that could be universally applied to safeguard devices.<\/p>\n\n\n\n<p>\u201cWhen you consider other security systems, for example a lock, what you would use for a front door is very different to what would be used for a bank or a Government building because the scale of an attack would be much greater and more complex in the case of the latter,\u201d he said. \u201cThe same is true for computers and embedded systems; when we think about security, we have to think about different levels that correspond to the level of risk.\u201d<\/p>\n\n\n\n<p>Hanna illustrated his point by comparing a baby monitor with a chemical plant \u2013 both of which are likely to become connected as standard in the near-future. For the latter, he said, the impact of an attack could be as serious as an explosion which would ultimately endanger human life.<\/p>\n\n\n\n<p>\u201cWhile it is important to secure things like baby monitors, for example, to avoid the devices being used to eavesdrop on conversations, there is a price point that needs to be met as well \u2013 no one is going to spend thousands of dollars on a baby monitor and for the manufacturers, that means the security solution needs to be less expensive,\u201d continued Hanna. \u201cIn the case of a chemical plant, the risk is much greater, the level of attack is likely to be more sophisticated and a serious amount of money could have been invested in carrying it out. As a result, the security measures need to be much more stringent.\u201d<\/p>\n\n\n\n<p>Hanna went on to explain that the customized security approach required by the Internet of Things can be easily achieved using technologies that are available today. TCG\u2019s security standards are all based on the concept of Trusted Computing where a Root of Trust forms the foundation of the device and meets the specific requirements of the device or deployment.<\/p>\n\n\n\n<p>\u201cTCG\u2019s wide variety of security options provide the building blocks to create secure systems,\u201d said Hanna. \u201cIn the case of a chemical plant, industrial-grade discrete TPM hardware can be built in not just into the plant\u2019s firewall but also into the control system. This will enable these systems to be monitored in real-time and for even sophisticated attacks to be identified and prevented. For devices which are less high-risk, TPM firmware can be created which has the same set of commands but is less rigorously secured and therefore more cost-effective. <\/p>\n\n\n\n<p>&#8220;Finally, for very tiny devices that can\u2019t afford TPM firmware, DICE offers a good alternative.\u201d  <\/p>\n","protected":false},"excerpt":{"rendered":"<p>Securing the Internet of Things (IoT) is something which cannot be done with a one-size-fits-all approach \u2013 and every kind of connected object must be assessed individually, the Co-chair of Trusted Computing Group\u2019s (TCG) Embedded Systems Work Group said. Speaking on the second day of Embedded Technologies Expo and Conference 2019, San Jose, California, Steve &hellip;<\/p>\n","protected":false},"author":1,"featured_media":13031,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[199],"tags":[6634],"class_list":["post-13030","post","type-post","status-publish","format-standard","has-post-thumbnail","","category-news-views-and-opinion","tag-trusted-computing-group"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>A one-size-fits-all approach &#039;will not be enough to secure the IoT&#039; - Engineer News Network<\/title>\n<meta name=\"description\" content=\"A one-size-fits-all approach will not be enough to secure the IoT, says TCG\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.engineernewsnetwork.com\/blog\/a-one-size-fits-all-approach-will-not-be-enough-to-secure-the-iot\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"A one-size-fits-all approach &#039;will not be enough to secure the IoT&#039; - Engineer News Network\" \/>\n<meta property=\"og:description\" content=\"A one-size-fits-all approach will not be enough to secure the IoT, says TCG\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.engineernewsnetwork.com\/blog\/a-one-size-fits-all-approach-will-not-be-enough-to-secure-the-iot\/\" \/>\n<meta property=\"og:site_name\" content=\"Engineer News Network\" \/>\n<meta property=\"article:published_time\" content=\"2019-07-02T13:00:55+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-07-03T08:37:26+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.engineernewsnetwork.com\/blog\/wp-content\/uploads\/2019\/06\/TCP-Image01.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1175\" \/>\n\t<meta property=\"og:image:height\" content=\"1029\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/a-one-size-fits-all-approach-will-not-be-enough-to-secure-the-iot\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/a-one-size-fits-all-approach-will-not-be-enough-to-secure-the-iot\\\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/#\\\/schema\\\/person\\\/4477342aea8e299c6a21761e513ea8e1\"},\"headline\":\"A one-size-fits-all approach &#8216;will not be enough to secure the IoT&#8217;\",\"datePublished\":\"2019-07-02T13:00:55+00:00\",\"dateModified\":\"2019-07-03T08:37:26+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/a-one-size-fits-all-approach-will-not-be-enough-to-secure-the-iot\\\/\"},\"wordCount\":557,\"image\":{\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/a-one-size-fits-all-approach-will-not-be-enough-to-secure-the-iot\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/06\\\/TCP-Image01.jpg\",\"keywords\":[\"Trusted Computing Group\u2019\"],\"articleSection\":[\"News, Views and Opinion\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/a-one-size-fits-all-approach-will-not-be-enough-to-secure-the-iot\\\/\",\"url\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/a-one-size-fits-all-approach-will-not-be-enough-to-secure-the-iot\\\/\",\"name\":\"A one-size-fits-all approach 'will not be enough to secure the IoT' - Engineer News Network\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/a-one-size-fits-all-approach-will-not-be-enough-to-secure-the-iot\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/a-one-size-fits-all-approach-will-not-be-enough-to-secure-the-iot\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/06\\\/TCP-Image01.jpg\",\"datePublished\":\"2019-07-02T13:00:55+00:00\",\"dateModified\":\"2019-07-03T08:37:26+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/#\\\/schema\\\/person\\\/4477342aea8e299c6a21761e513ea8e1\"},\"description\":\"A one-size-fits-all approach will not be enough to secure the IoT, says TCG\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/a-one-size-fits-all-approach-will-not-be-enough-to-secure-the-iot\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/a-one-size-fits-all-approach-will-not-be-enough-to-secure-the-iot\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/a-one-size-fits-all-approach-will-not-be-enough-to-secure-the-iot\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/06\\\/TCP-Image01.jpg\",\"contentUrl\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/06\\\/TCP-Image01.jpg\",\"width\":1175,\"height\":1029,\"caption\":\"Steve Hanna, Co-chair of TCG\u2019s Embedded Systems Work Group\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/a-one-size-fits-all-approach-will-not-be-enough-to-secure-the-iot\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"A one-size-fits-all approach &#8216;will not be enough to secure the IoT&#8217;\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/\",\"name\":\"Engineer News Network\",\"description\":\"The ultimate online news and information resource for today's engineer\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/#\\\/schema\\\/person\\\/4477342aea8e299c6a21761e513ea8e1\",\"name\":\"admin\",\"url\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"A one-size-fits-all approach 'will not be enough to secure the IoT' - Engineer News Network","description":"A one-size-fits-all approach will not be enough to secure the IoT, says TCG","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.engineernewsnetwork.com\/blog\/a-one-size-fits-all-approach-will-not-be-enough-to-secure-the-iot\/","og_locale":"en_GB","og_type":"article","og_title":"A one-size-fits-all approach 'will not be enough to secure the IoT' - Engineer News Network","og_description":"A one-size-fits-all approach will not be enough to secure the IoT, says TCG","og_url":"https:\/\/www.engineernewsnetwork.com\/blog\/a-one-size-fits-all-approach-will-not-be-enough-to-secure-the-iot\/","og_site_name":"Engineer News Network","article_published_time":"2019-07-02T13:00:55+00:00","article_modified_time":"2019-07-03T08:37:26+00:00","og_image":[{"width":1175,"height":1029,"url":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-content\/uploads\/2019\/06\/TCP-Image01.jpg","type":"image\/jpeg"}],"author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin","Estimated reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.engineernewsnetwork.com\/blog\/a-one-size-fits-all-approach-will-not-be-enough-to-secure-the-iot\/#article","isPartOf":{"@id":"https:\/\/www.engineernewsnetwork.com\/blog\/a-one-size-fits-all-approach-will-not-be-enough-to-secure-the-iot\/"},"author":{"name":"admin","@id":"https:\/\/www.engineernewsnetwork.com\/blog\/#\/schema\/person\/4477342aea8e299c6a21761e513ea8e1"},"headline":"A one-size-fits-all approach &#8216;will not be enough to secure the IoT&#8217;","datePublished":"2019-07-02T13:00:55+00:00","dateModified":"2019-07-03T08:37:26+00:00","mainEntityOfPage":{"@id":"https:\/\/www.engineernewsnetwork.com\/blog\/a-one-size-fits-all-approach-will-not-be-enough-to-secure-the-iot\/"},"wordCount":557,"image":{"@id":"https:\/\/www.engineernewsnetwork.com\/blog\/a-one-size-fits-all-approach-will-not-be-enough-to-secure-the-iot\/#primaryimage"},"thumbnailUrl":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-content\/uploads\/2019\/06\/TCP-Image01.jpg","keywords":["Trusted Computing Group\u2019"],"articleSection":["News, Views and Opinion"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.engineernewsnetwork.com\/blog\/a-one-size-fits-all-approach-will-not-be-enough-to-secure-the-iot\/","url":"https:\/\/www.engineernewsnetwork.com\/blog\/a-one-size-fits-all-approach-will-not-be-enough-to-secure-the-iot\/","name":"A one-size-fits-all approach 'will not be enough to secure the IoT' - Engineer News Network","isPartOf":{"@id":"https:\/\/www.engineernewsnetwork.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.engineernewsnetwork.com\/blog\/a-one-size-fits-all-approach-will-not-be-enough-to-secure-the-iot\/#primaryimage"},"image":{"@id":"https:\/\/www.engineernewsnetwork.com\/blog\/a-one-size-fits-all-approach-will-not-be-enough-to-secure-the-iot\/#primaryimage"},"thumbnailUrl":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-content\/uploads\/2019\/06\/TCP-Image01.jpg","datePublished":"2019-07-02T13:00:55+00:00","dateModified":"2019-07-03T08:37:26+00:00","author":{"@id":"https:\/\/www.engineernewsnetwork.com\/blog\/#\/schema\/person\/4477342aea8e299c6a21761e513ea8e1"},"description":"A one-size-fits-all approach will not be enough to secure the IoT, says TCG","breadcrumb":{"@id":"https:\/\/www.engineernewsnetwork.com\/blog\/a-one-size-fits-all-approach-will-not-be-enough-to-secure-the-iot\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.engineernewsnetwork.com\/blog\/a-one-size-fits-all-approach-will-not-be-enough-to-secure-the-iot\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.engineernewsnetwork.com\/blog\/a-one-size-fits-all-approach-will-not-be-enough-to-secure-the-iot\/#primaryimage","url":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-content\/uploads\/2019\/06\/TCP-Image01.jpg","contentUrl":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-content\/uploads\/2019\/06\/TCP-Image01.jpg","width":1175,"height":1029,"caption":"Steve Hanna, Co-chair of TCG\u2019s Embedded Systems Work Group"},{"@type":"BreadcrumbList","@id":"https:\/\/www.engineernewsnetwork.com\/blog\/a-one-size-fits-all-approach-will-not-be-enough-to-secure-the-iot\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.engineernewsnetwork.com\/blog\/"},{"@type":"ListItem","position":2,"name":"A one-size-fits-all approach &#8216;will not be enough to secure the IoT&#8217;"}]},{"@type":"WebSite","@id":"https:\/\/www.engineernewsnetwork.com\/blog\/#website","url":"https:\/\/www.engineernewsnetwork.com\/blog\/","name":"Engineer News Network","description":"The ultimate online news and information resource for today's engineer","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.engineernewsnetwork.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Person","@id":"https:\/\/www.engineernewsnetwork.com\/blog\/#\/schema\/person\/4477342aea8e299c6a21761e513ea8e1","name":"admin","url":"https:\/\/www.engineernewsnetwork.com\/blog\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-json\/wp\/v2\/posts\/13030","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-json\/wp\/v2\/comments?post=13030"}],"version-history":[{"count":2,"href":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-json\/wp\/v2\/posts\/13030\/revisions"}],"predecessor-version":[{"id":13100,"href":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-json\/wp\/v2\/posts\/13030\/revisions\/13100"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-json\/wp\/v2\/media\/13031"}],"wp:attachment":[{"href":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-json\/wp\/v2\/media?parent=13030"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-json\/wp\/v2\/categories?post=13030"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-json\/wp\/v2\/tags?post=13030"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}