<div dir="ltr"><div><div><div dir="ltr">
<table bgcolor="#ffffff" cellpadding="0" cellspacing="0" width="100%">
<tbody>
<tr>
<td align="left" valign="top">
<table cellpadding="0" cellspacing="0">
<tbody>
<tr>
<td style="border-top:0px solid rgb(0,0,0);border-bottom:1px solid rgb(255,255,255);background-color:rgb(255,255,255);text-align:center" align="center"><span style="font-size:10px;color:rgb(96,96,96);line-height:200%;font-family:verdana;text-decoration:none">Email
not displaying correctly? <a href="http://www.oplin.org/4cast/" style="font-size:10px;color:rgb(0,0,255);line-height:200%;font-family:verdana;text-decoration:none" target="_blank">View
it in your browser.</a></span></td>
</tr>
<tr>
<td style="border-top:0px solid rgb(51,51,51);border-bottom:0px solid rgb(255,255,255);background-color:rgb(255,255,255)">
<center><a><img src="http://www.oplin.org/4cast/wp-content/themes/4cast/images/kubrickheader.jpg" title="OPLIN" alt="OPLIN 4Cast" align="middle" border="0"></a></center>
</td>
</tr>
</tbody>
</table>
<table style="width:763px;height:877px" bgcolor="#ffffff" cellpadding="20" cellspacing="0">
<tbody>
<tr>
<td style="font-size:12px;color:rgb(0,0,0);line-height:150%;font-family:trebuchet ms" background="http://www.oplin.org/4cast/wp-content/themes/4cast/images/kubrickbgwide.jpg" bgcolor="#ffffff" valign="top">
<p>
<span style="font-size:20px;font-weight:bold;color:rgb(0,0,0);font-family:arial;line-height:110%">OPLIN 4cast #436: IoT security</span><br>
<span style="font-size:11px;font-weight:normal;color:rgb(102,102,102);font-style:italic;font-family:arial">May 6th, 2015</span></p>
<p style="text-align:justify;font-size:16px;font-family:arial;line-height:110%"><img align="left" src="http://www.oplin.org/4cast/wp-content/uploads/2015/05/graph.png" alt="graph" width="110" height="90">As more and more specialized electronic devices automatically connect to Wi-Fi wherever they can find a node, comprising the so-called Internet of Things (IoT), the people who install and maintain wireless access points in libraries will encounter more and more concerns. For one thing, designing a wireless network for the IoT requires a shift in thinking, from providing big bandwidth for a few devices that patrons are using to “read” the Internet, to providing small bandwidth for a multitude of devices that they happen to be wearing in the library. But an even larger concern may be network security, since many of these devices have been designed with little or no thought given to protections against hacking and viruses.
</p>
<div> </div>
<ul style="text-align:left">
<li style="text-align:justify;font-size:16px;font-family:arial;line-height:110%"><a href="http://blog.kaspersky.com/internet-of-crappy-things/" target="_blank">Internet of Crappy Things</a> (Kaspersky blog | Alex Drozhzin) “In general, the problem is that those who develop home appliances and make them connected face realities of a brand new world they know nothing about. They ultimately find themselves in a situation similar to that of an experienced basketball player sitting through a chess match with a real grand master. Things get even worse when it comes to the users of connected devices. They don’t bother with security at all. For an average user, a connected microwave is still just a microwave. A user would never imagine it is a fully-equipped connected computer which has means of influencing the physical world.”</li>
<li style="text-align:justify;font-size:16px;font-family:arial;line-height:110%"><a href="http://www.networkcomputing.com/wireless-infrastructure/prepping-wlans-for-the-internet-of-things/d/d-id/1320221" target="_blank">Prepping WLANs for the Internet Of Things</a> (Network Computing | Marcia Savage) “IoT security is a top concern, [director of product marketing at Aerohive Networks Abby] Strong said. Oftentimes the devices have custom operating systems, so antivirus can’t simply be installed on them. ‘There are few best practices for how to handle IoT systems,’ she said. ‘And absolutely no standardization. The industry doesn’t even know what the risks are yet.’”</li>
<li style="text-align:justify;font-size:16px;font-family:arial;line-height:110%"><a href="http://www.toptal.com/it/are-we-creating-an-insecure-internet-of-things" target="_blank">Are we creating an insecure Internet of Things (IoT)? Security challenges and concerns</a> (Toptal | Nermin Hajdarbegovic) “[Federal Trade Commission chairwoman Edith] Ramirez went on to say that developers of IoT devices have not spent time thinking about how to secure their devices and services from cyberattacks. ‘The small size and limited processing power of many connected devices could inhibit encryption and other robust security measures,’ said Ramirez. ‘Moreover, some connected devices are low-cost and essentially disposable. If a vulnerability is discovered on that type of device, it may be difficult to update the software or apply a patch – or even to get news of a fix to consumers.’”</li>
<li style="text-align:justify;font-size:16px;font-family:arial;line-height:110%"><a href="http://www.dailymail.co.uk/sciencetech/article-2928946/US-watchdog-urges-safeguards-Internet-Things.html" target="_blank">‘Internet of Things’ gets watchdog: Report calls for extra security to prevent hacking of smart gadgets in homes</a> (Daily Mail | Victoria Woollaston) “Last year, the FTC studied 12 mobile fitness apps and found they shared data with 76 separate entities. Ms Ramirez continued: ‘If I’m wearing a fitness band that tracks how many calories I consume I wouldn’t want to share that data with an insurance company.’ The FTC report made no specific legislative recommendation for IoT but said ‘there appeared to be widespread agreement that companies developing IoT products should implement reasonable security.’”</li>
</ul>
<div style="text-align:left"> </div>
<p style="text-align:left;font-size:20px;font-family:arial;line-height:110%"><small><strong><em>Articles from <a href="http://ohioweblibrary.org" target="_blank">Ohio Web Library</a>:</em></strong></small><br>
</p>
<div style="text-align:justify;font-size:16px;font-family:arial;line-height:110%">
<ul>
<li><a href="http://web.a.ebscohost.com.proxy.oplin.org/ehost/detail/detail?sid=ed5315fa-1582-4910-b91a-cd81db965c2c%40sessionmgr4002&vid=0&hid=4207&bdata=JnNpdGU9ZWhvc3QtbGl2ZQ%3d%3d#db=buh&AN=99746242" target="_blank">Regulating the Internet of Things: First steps toward managing discrimination, privacy, security, and consent.</a> (<em>Texas Law Review</em>, Nov. 2014, p.85-178 | Scott R. Peppet)</li>
<li><a href="http://web.a.ebscohost.com.proxy.oplin.org/ehost/detail/detail?sid=a4015e44-7f04-46df-a3cd-3f9d8b81ee01%40sessionmgr4002&vid=0&hid=4207&bdata=JnNpdGU9ZWhvc3QtbGl2ZQ%3d%3d#db=buh&AN=102264663" target="_blank">Ensuring security in the connected home.</a> (<em>ECN: Electronic Component News</em>, May 2015, p.16-19 | Ogi Brkic)</li>
<li><a href="http://web.a.ebscohost.com.proxy.oplin.org/ehost/detail/detail?sid=d45b7a7b-2cb8-408c-933d-9d09af5ed06b%40sessionmgr4002&vid=0&hid=4207&bdata=JnNpdGU9ZWhvc3QtbGl2ZQ%3d%3d#db=f5h&AN=102130059" target="_blank">In the privacy of your own home.</a> (<em>Consumer Reports</em>, June 2015, p.24-30)</li>
</ul>
</div>
<div style="text-align:left"> </div>
</td>
</tr>
<tr>
<td background="http://www.oplin.org/4cast/wp-content/themes/4cast/images/kubrickbgwide.jpg" valign="top" width="760"><span style="font-size:10px;color:rgb(96,96,96);line-height:100%;font-family:verdana">
<hr>
<div style="text-align:justify">The <strong><em>OPLIN
4cast</em></strong>
is a weekly compilation of
recent headlines, topics, and trends that could impact public
libraries. You can subscribe to it in a variety of ways, such as: <br>
</div>
<div style="text-align:left"> </div>
<ul>
<li style="text-align:justify"><strong>RSS feed.</strong>
You
can receive the OPLIN 4cast
via RSS feed by subscribing to the following URL:
<a href="http://www.oplin.org/4cast/index.php/?feed=rss2" target="_blank">http://www.oplin.org/4cast/index.php/?feed=rss2</a>. </li>
<li style="text-align:justify"><strong>Live Bookmark.</strong>
If you're using the Firefox
web browser, you can go to the 4cast website
(<a href="http://www.oplin.org/4cast/" target="_blank">http://www.oplin.org/4cast/</a>) and click on the orange "radio wave" icon
on the right side of the address bar. In Internet Explorer 7, click on
the same icon to view or subscribe to the 4cast RSS feed. </li>
<li style="text-align:justify"><strong>E-mail.</strong>
You
can have the OPLIN 4cast
delivered via e-mail (a'la OPLINlist and OPLINtech) by subscribing to
the 4cast mailing list at
<a href="http://mail.oplin.org/mailman/listinfo/OPLIN4cast" target="_blank">http://mail.oplin.org/mailman/listinfo/OPLIN4cast</a>. </li>
</ul>
</span> </td>
</tr>
<tr>
<td style="border-top:0px solid rgb(255,255,255);background-color:rgb(255,255,204)" background="http://www.oplin.org/4cast/wp-content/themes/4cast/images/kubrickfooter.jpg" valign="top" width="760"> <br>
</td>
</tr>
</tbody>
</table>
</td>
</tr>
</tbody>
</table>
</div></div></div>
</div>