

It’s easier and more convenient, as it resembles the ICT security application method rather than the ideal IoT security we expected.ģ) and 4) rather have the nature of being regulative. This is just like how personal computers are secured nowadays, hence most of the IoT security companies are setting their minds to this method. Crisis management in the context of IoT security most likely explains why security, in any sort, is applied only after an incident occurs. This is when autonomous security slowly sprawls in a form of crisis management. In terms of factories, it is critical to apply security for the sole reason of safety, however, a lot of the factories haven’t even applied the existing ICT security as we know it. Users can decide whether they need IoT implementations and if they do, they get to make their own decision of whether their implementations need security applications or not. Simply put, there are basically 4 areas that need security in the IoT space: 1) smart home, 2) smart factory, 3) smart car, and 4) smart energy grid.ġ) and 2) tend to have the nature of being autonomous. As the IoT technology advances, we start to wonder if the security around the technology is sufficient enough. The time has come to assume that people with somewhat accessibility to IoT devices now know how it should have stronger security than ICT security as it can directly affect and control the devices and cause actual and physical damages when exploited.Īutonomous Security and Regulative Security
