Issue link: https://resources.mouser.com/i/1442760
18 | 18 | • Fleet management in transportation • Security and surveillance applications in government • Inventory and warehouse management applications in retail • Industrial asset management in primary manufacturing What's more, Forrester also notes that hackers will continue to exploit IoT devices to carry out distributed denial of service (DDoS) attacks. The FBI's Internet Crime Complaint Center (IC3) tracks public complaints about suspected Internet-facilitated criminal activity. According to the bureau's 2015 Internet Crime Report, IC3 has logged more than 3.4 million complaints since it was formed in May 2000, averaging nearly 300,000 complaints per year over the last five years. Figure 1 tracks complaints received since 2010. The same FBI report also notes the cost associated with Internet-facilitated crimes. Figure 2 provides a breakdown from 2015 (the most recent such report available at the time this white paper was published). In the face of all of these threats and risks, why is security such an afterthought in so many industries? The simple truth is that, for many companies, security takes a back seat because of the perceived cost and time it adds to the product development cycle. However, neglecting design security comes with even greater costs in terms of lost revenue, brand reputation damage, and even personal harm. What's more, software-based security approaches do not provide the strongest protection, as many are led to believe. Hardware-based security delivers a much more rock-solid methodology. Smarter Devices Are Even Less Secure There are a variety of other industries where security should be a key design consideration. • Industrial is transitioning from previously isolated systems to fully networked systems that could expose equipment to remote attack • Healthcare comes with privacy, data integrity, and patient safety issues should medical records or equipment and devices fall under attack • Online banking is at risk because it's hard to guarantee identity visually • Retailers with mobile sales channels must ensure safe transactions and communications • Communications requires end-to-end security to protect against a variety of attacks that could intercept data or bring down systems • With connected cars, the automotive industry needs to guard against threats such as remote hacking (Remember when white-hat hackers remotely disabled a Jeep on a St. Louis highway in 2015?) • Infrastructure such as the smart grid or other utilities need to be safeguarded against attacks that could disrupt cities or harm people Obviously, in an industry like finance, there are clear rewards for perpetrators who are able to, say, break into a credit card system. The risks are great, too, but the potential rewards for someone who's able to get away with this crime could outweigh the risks. Today, we're surrounded by a growing amount of smart, connected devices, each with many more potential points of vulnerability than our "dumb" devices have ever had. In some cases, the risk has become smaller because of accessibility. From doorbells and home security systems to medical devices, factory/building control systems, autonomous vehicles, and city infrastructure functions, the array of things that have sensing, connectivity, and communications capabilities are anticipated to number 20.8 billion by 2020, according to Gartner ® . Often, Cybercrimes Tracked By the FBI $1,070,711,522 288,012 127,145 $8,421 Losses Reported Complaints Received Complaints Reporting a Loss Average Dollar Loss for Complaints Reporting a Loss Source: FBI Figure 2: Internet-facilitated crimes tracked by the FBI's Internet Crime Complaint Center. (Source: Maxim Integrated) MORE THAN 3.4 MILLION INTERNET CRIME COMPLAINTS LOGGED BY IC3 SINCE ITS INCEPTION SOURCE: FBI 2010 2011 2012 2013 2014 2015 303,809 314,246 289,813 262,813 269,422 288,012 Figure 1: The FBI's 2015 Internet Crime Report captures public complaints submitted to the bureau's Internet Crime Complaint Center over Internet-facilitated crimes. (Source: Maxim Integrated)