Page 33 - AeM_October_2021
P. 33

LEGISLATION












































       Challenge of IoT:


       data protection and data security



       The Internet of Things (IoT) not only offers new    However, despite the myriad of devices and their wide
       opportunities  for  marketing  communication  but   array of use cases, industry verticals started to collabo-
       confronts companies at the same time with new       rate  creating  use  case  specific  IoT  security  and  con-
       challenges  –  especially  in  the  areas  of  data   nectivity standards. Because, both hardware manufac-
       protection and data security.                       turers and software vendors are challenged by the in-
                                                           creasing risk of vulnerabilities in IoT devices.
       Perceived  as  an  infrastructure  between  physical  and
       virtual  objects  that  can  communicate  with  people  and   The  convergence  of  technologies,  including  big  data,
       other connected devices, it supposedly has the poten-  cloud, analytics, and mobility, along with lower sensor
       tial to make our lives easier. We should be aware, how-  prices  and  exponential  social  media  adoption,  are  in-
       ever,  that  each  of  these  new  smart  devices  collects   strumental in driving IoT adoption worldwide.
       data about us. Some data recorded can be highly sen-  Asia, and Southeast Asia in particular, are no exception
       sitive, be it health data from customers in B2C or data
       on  business-relevant  processes  in  B2B,  therefore  de-  when  it  comes  to  growing  traction  towards  IoT  adop-
       manding  comprehensive  data  protection  and  security.   tion.  And  already  back  in  2014,  FireEye  reported  that
       Keep  in  mind  that  with  every  data-producing  device,   Asia  Pacific  is  35%  more  likely  to  be  targeted  by  ad-
       there is another source and transmission path on which   vanced  cyber-attacks  as  compared  to  the  rest  of  the
       data must be protected from misuse in the process.   world.  In  any  case,  vulnerabilities  in  IoT  devices  are
                                                           constantly exploited by attackers to access confidential
       Since every IoT vertical and use case has different ar-  corporate  data,  steal  user  information,  or  spread  mal-
       chitectural  patterns,  there  is  so  far  no  set  standard,   ware.
       considering  device  heterogeneity,  vertical  specific   So,  avoid  the  following  negligence,  according  to  the
       standards, and emerging architectural concepts.
                                                           OWASP Internet of Things Project:



         October 2021: IoT in Marketing                 33
   28   29   30   31   32   33   34   35   36   37   38