element14 Community
element14 Community
    Register Log In
  • Site
  • Search
  • Log In Register
  • Community Hub
    Community Hub
    • What's New on element14
    • Feedback and Support
    • Benefits of Membership
    • Personal Blogs
    • Members Area
    • Achievement Levels
  • Learn
    Learn
    • Ask an Expert
    • eBooks
    • element14 presents
    • Learning Center
    • Tech Spotlight
    • STEM Academy
    • Webinars, Training and Events
    • Learning Groups
  • Technologies
    Technologies
    • 3D Printing
    • FPGA
    • Industrial Automation
    • Internet of Things
    • Power & Energy
    • Sensors
    • Technology Groups
  • Challenges & Projects
    Challenges & Projects
    • Design Challenges
    • element14 presents Projects
    • Project14
    • Arduino Projects
    • Raspberry Pi Projects
    • Project Groups
  • Products
    Products
    • Arduino
    • Avnet & Tria Boards Community
    • Dev Tools
    • Manufacturers
    • Multicomp Pro
    • Product Groups
    • Raspberry Pi
    • RoadTests & Reviews
  • About Us
  • Store
    Store
    • Visit Your Store
    • Choose another store...
      • Europe
      •  Austria (German)
      •  Belgium (Dutch, French)
      •  Bulgaria (Bulgarian)
      •  Czech Republic (Czech)
      •  Denmark (Danish)
      •  Estonia (Estonian)
      •  Finland (Finnish)
      •  France (French)
      •  Germany (German)
      •  Hungary (Hungarian)
      •  Ireland
      •  Israel
      •  Italy (Italian)
      •  Latvia (Latvian)
      •  
      •  Lithuania (Lithuanian)
      •  Netherlands (Dutch)
      •  Norway (Norwegian)
      •  Poland (Polish)
      •  Portugal (Portuguese)
      •  Romania (Romanian)
      •  Russia (Russian)
      •  Slovakia (Slovak)
      •  Slovenia (Slovenian)
      •  Spain (Spanish)
      •  Sweden (Swedish)
      •  Switzerland(German, French)
      •  Turkey (Turkish)
      •  United Kingdom
      • Asia Pacific
      •  Australia
      •  China
      •  Hong Kong
      •  India
      •  Korea (Korean)
      •  Malaysia
      •  New Zealand
      •  Philippines
      •  Singapore
      •  Taiwan
      •  Thailand (Thai)
      • Americas
      •  Brazil (Portuguese)
      •  Canada
      •  Mexico (Spanish)
      •  United States
      Can't find the country/region you're looking for? Visit our export site or find a local distributor.
  • Translate
  • Profile
  • Settings
Community Hub
Community Hub
Member Blogs Computer Security Day - How to Secure Your Devices
  • Blog
  • Forum
  • Documents
  • Quiz
  • Events
  • Leaderboard
  • Polls
  • Files
  • Members
  • Mentions
  • Sub-Groups
  • Tags
  • More
  • Cancel
  • New
Join Community Hub to participate - click to join for free!
  • Share
  • More
  • Cancel
Group Actions
  • Group RSS
  • More
  • Cancel
Engagement
  • Author Author: spannerspencer
  • Date Created: 28 Nov 2016 3:19 PM Date Created
  • Views 2247 views
  • Likes 1 like
  • Comments 17 comments
  • computer security day
  • security
  • password
  • csd
Related
Recommended

Computer Security Day - How to Secure Your Devices

spannerspencer
spannerspencer
28 Nov 2016

image

It's November 30th, which means it's A) Just under one month until New Year's Eve, and B) It's World Computer Security Day (CSD)!

 

You can find out a little more about the origins of the day itself over here, and tell us about your best practices when it comes to securing your digital life.

 

Beyond Computer Security

This is a long-lived awareness campaign already, but it's changing as fast as the computers it's based around.

 

CSD is a concept that increases in magnitude somewhere like the element14 Community. Here, we're interested in lots of different types of computers, microprocessors, systems and platforms; and most all of them involve some manner of digital security measures. A campaign that originally looked at encouraging people to change one, or maybe two passwords now involves something of an epic security endeavour for engineers, makers and tech-heads who are into all the available prototyping platforms out there now.

 

So is it also time to change the password on your Raspberry Pi root? Should your Internet of Things devices get a new login? Are there any concerns around your connected Arduino projects?

 

Updating a Windows password is easy, but updating a headless single board computer or homemade connected thermostat or wi-fi operated light fitting is something else entirely. Even those of us who take an active interest in these things might struggle to keep up to speed on every item we've built into a maker project.

 

So I'd like to encourage those of you in the know to pick a platform or process of your choice, and write a blog detailing how to change or update its passwords, logins or security features.

 

Tag it with "Computer Security Day" (and put a link to it in the comments here, if you like) and we'll compile all your cyber security instructions into a cyber security bible that will help keep our corner of the internet just a little bit safer. If we can enough blog posts together on the subject of cyber security, we could potentially edit these into an e-book that'll become a valuable reference for all of us.

 


 

Don't forget! Now that you've secured your digital self, come and tell us how you can make yourself and others safe and sound in the physical world, in our brand new Safe and Sound Design Challenge.

 

You could win a nice, safe quadcopter with which to "enhance" your neighbour's security and privacy!

  • Sign in to reply

Top Comments

  • Jan Cumps
    Jan Cumps over 8 years ago +3
    My wish is that each IoT Hardware & Software supplier incorporates security in their "Out of Box" example. No more "Hello, world!" examples that are unsafe! That's the first step to get designers booted…
  • jgerred
    jgerred over 8 years ago +2
    Security is a trade off between being secure and being usable. If you buy a new computer, take it home, dig a hole 60 feet deep, put the new computer (still in the box) in the bottom of the hole, and then…
  • DAB
    DAB over 8 years ago +1
    All of my devices are reasonably secure because I always turn them off when I am done. It is difficult to hack a device that is physically not available for exploitation. DAB
  • Jan Cumps
    Jan Cumps over 8 years ago in reply to DAB +1
    I kindly don't agree, DAB. A device is only safe when safety is part of the design. Your solution puts the burden on the user. A user can be anyone, skilled or not. It should be on the hardware+software…
  • DAB
    DAB over 8 years ago in reply to Jan Cumps +1
    True, but I am lazy and it has worked for about 40 years of computer use. If you want true computer security, then it needs to be automatic and transparent to the user. The biggest weakness in the ENIGMA…
  • clem57
    clem57 over 8 years ago in reply to DAB +1
    Not so true since quite a few are human engineering from the outside. See http://www.paramecium.org/~leendert/publications/nluug1992.pdf Clem
  • Jan Cumps
    Jan Cumps over 8 years ago in reply to DAB +1
    ... and I accept that, DAB. In the world of IoT, a big (I don't want to vote for the biggest) weakness is that the experts give the non-experts unsafe examples to start with - as if that's the normal way…
  • mcb1
    mcb1 over 8 years ago in reply to Jan Cumps +1
    The EnOcean device packets are encrypted ... but they aren't really connected to the internet.
  • Jan Cumps
    Jan Cumps over 8 years ago in reply to jgerred +1
    James, doesn't your rule ignore the responsibility of the IoT device itself to be secured, and put security care "in someone else's well secured device"? That may be good enough if you build for yourself…
  • jgerred
    jgerred over 8 years ago in reply to Jan Cumps +1
    Well, like I said in my post " With regards to the IoT ongoing issues, security should be thought of from the start.", in my opinion the manufacturers and folks that build devices for others should think…
  • jgerred
    jgerred over 8 years ago in reply to Jan Cumps

    Well, like I said in my post "With regards to the IoT ongoing issues, security should be thought of from the start.", in my opinion the manufacturers and folks that build devices for others should think of security from the start.

     

    From what I understand, the cameras that are part of the Mirai botnet are directly connected to the internet and utilize a website to interface with them for regular use (the whole in the cloud management). 

     

    I guess my original post wasn't detailed enough, the gateway I referred to there was a gateway and/or firewall on my local network, not the cloud providers config/control page. 

     

    Security should be baked in from the start, the continuing use of default passwords, hard coded passwords that can't be changed, backdoors left in for testing, etc are the fault of the manufacturers and the lackadaisical approach that a lot of them take towards security.  It is also the fault of the consumer for not changing the default passwords. 

     

    Any device can be compromised, it just depends on the level of effort required versus the perceived value of the compromised device.

     

    Think of security like the multiple layers of an onion, that is what I try to achieve in my setup and with devices that I fiddle with.  I wasn't trying to imply that security on the individual devices should be neglected, but you shouldn't rely on just that one device either.  Implement good firewall rules on your router, and ensure that your devices are configured in a sane and secure manner, but keep in mind the trade off between secure and usable. 

     

    • Cancel
    • Vote Up +1 Vote Down
    • Sign in to reply
    • More
    • Cancel
  • Jan Cumps
    Jan Cumps over 8 years ago in reply to jgerred

    James, doesn't your rule ignore the responsibility of the IoT device itself to be secured, and put security care "in someone else's well secured device"?

    That may be good enough if you build for yourself only. But what if you publish the design, or make it for others?

    The cameras that were hacked in the latest DNS DoS are devices that are connected via a gateway to the internet.

    • Cancel
    • Vote Up +1 Vote Down
    • Sign in to reply
    • More
    • Cancel
  • jgerred
    jgerred over 8 years ago

    Security is a trade off between being secure and being usable.  If you buy a new computer, take it home, dig a hole 60 feet deep, put the new computer (still in the box) in the bottom of the hole, and then fill the hole with concrete, you have a reasonable assurance that the computer is "secure", however it is not very usable.

     

    With regards to the IoT ongoing issues, security should be thought of from the start.  If you are building a device that is going to be directly connected to the internet then you should make sure that there is a way of securing it while still making it usable and keeping in mind that what is secure today might not be tomorrow.

     

    My rule (not iron clad!) for devices I build and fiddle with is that they are not directly connected to the internet and require a gateway of some sort to get to them.  This minimizes the exposure since you only secure one device and make that as secure as possible (again, keeping in mind that there are risks of having it connected to the net).  Additionally, any device that I am fiddling with usually has a hard wired connection of some sort so it has less of a footprint open for attack vectors.

    • Cancel
    • Vote Up +2 Vote Down
    • Sign in to reply
    • More
    • Cancel
  • mcb1
    mcb1 over 8 years ago in reply to COMPACT

    But in Australia they'll transmit on one of our Cell phone frequency ranges!!

    Well then you can listen to the jubble ...

     

    I highlighted this in earlier discussions ...

    Sometimes the security of the packet is not the problem, it's the mere presecence of a packet that comprimises the security.

     

    If a criminal wants to target people returning to cars, then he only needs to detect the prescence of data.

    Obviously the chances of identifying the car is reduced with the number of cars in the car park.

     

    In this example there is no comprimise of the data, just the fact it is there.

     

    Mark

    • Cancel
    • Vote Up 0 Vote Down
    • Sign in to reply
    • More
    • Cancel
  • COMPACT
    COMPACT over 8 years ago in reply to mcb1

    But in Australia they'll transmit on one of our Cell phone frequency ranges!!

    • Cancel
    • Vote Up 0 Vote Down
    • Sign in to reply
    • More
    • Cancel
>
element14 Community

element14 is the first online community specifically for engineers. Connect with your peers and get expert answers to your questions.

  • Members
  • Learn
  • Technologies
  • Challenges & Projects
  • Products
  • Store
  • About Us
  • Feedback & Support
  • FAQs
  • Terms of Use
  • Privacy Policy
  • Legal and Copyright Notices
  • Sitemap
  • Cookies

An Avnet Company © 2025 Premier Farnell Limited. All Rights Reserved.

Premier Farnell Ltd, registered in England and Wales (no 00876412), registered office: Farnell House, Forge Lane, Leeds LS12 2NE.

ICP 备案号 10220084.

Follow element14

  • X
  • Facebook
  • linkedin
  • YouTube