element14 Community
element14 Community
    Register Log In
  • Site
  • Search
  • Log In Register
  • Community Hub
    Community Hub
    • What's New on element14
    • Feedback and Support
    • Benefits of Membership
    • Personal Blogs
    • Members Area
    • Achievement Levels
  • Learn
    Learn
    • Ask an Expert
    • eBooks
    • element14 presents
    • Learning Center
    • Tech Spotlight
    • STEM Academy
    • Webinars, Training and Events
    • Learning Groups
  • Technologies
    Technologies
    • 3D Printing
    • FPGA
    • Industrial Automation
    • Internet of Things
    • Power & Energy
    • Sensors
    • Technology Groups
  • Challenges & Projects
    Challenges & Projects
    • Design Challenges
    • element14 presents Projects
    • Project14
    • Arduino Projects
    • Raspberry Pi Projects
    • Project Groups
  • Products
    Products
    • Arduino
    • Avnet & Tria Boards Community
    • Dev Tools
    • Manufacturers
    • Multicomp Pro
    • Product Groups
    • Raspberry Pi
    • RoadTests & Reviews
  • About Us
  • Store
    Store
    • Visit Your Store
    • Choose another store...
      • Europe
      •  Austria (German)
      •  Belgium (Dutch, French)
      •  Bulgaria (Bulgarian)
      •  Czech Republic (Czech)
      •  Denmark (Danish)
      •  Estonia (Estonian)
      •  Finland (Finnish)
      •  France (French)
      •  Germany (German)
      •  Hungary (Hungarian)
      •  Ireland
      •  Israel
      •  Italy (Italian)
      •  Latvia (Latvian)
      •  
      •  Lithuania (Lithuanian)
      •  Netherlands (Dutch)
      •  Norway (Norwegian)
      •  Poland (Polish)
      •  Portugal (Portuguese)
      •  Romania (Romanian)
      •  Russia (Russian)
      •  Slovakia (Slovak)
      •  Slovenia (Slovenian)
      •  Spain (Spanish)
      •  Sweden (Swedish)
      •  Switzerland(German, French)
      •  Turkey (Turkish)
      •  United Kingdom
      • Asia Pacific
      •  Australia
      •  China
      •  Hong Kong
      •  India
      • Japan
      •  Korea (Korean)
      •  Malaysia
      •  New Zealand
      •  Philippines
      •  Singapore
      •  Taiwan
      •  Thailand (Thai)
      • Vietnam
      • Americas
      •  Brazil (Portuguese)
      •  Canada
      •  Mexico (Spanish)
      •  United States
      Can't find the country/region you're looking for? Visit our export site or find a local distributor.
  • Translate
  • Profile
  • Settings
Community Hub
Community Hub
Member Blogs Computer Security Day - How to Secure Your Devices
  • Blog
  • Forum
  • Documents
  • Quiz
  • Events
  • Leaderboard
  • Polls
  • Files
  • Members
  • Mentions
  • Sub-Groups
  • Tags
  • More
  • Cancel
  • New
Join Community Hub to participate - click to join for free!
  • Share
  • More
  • Cancel
Group Actions
  • Group RSS
  • More
  • Cancel
Engagement
  • Author Author: spannerspencer
  • Date Created: 28 Nov 2016 3:19 PM Date Created
  • Views 2276 views
  • Likes 1 like
  • Comments 17 comments
  • computer security day
  • security
  • password
  • csd
Related
Recommended

Computer Security Day - How to Secure Your Devices

spannerspencer
spannerspencer
28 Nov 2016

image

It's November 30th, which means it's A) Just under one month until New Year's Eve, and B) It's World Computer Security Day (CSD)!

 

You can find out a little more about the origins of the day itself over here, and tell us about your best practices when it comes to securing your digital life.

 

Beyond Computer Security

This is a long-lived awareness campaign already, but it's changing as fast as the computers it's based around.

 

CSD is a concept that increases in magnitude somewhere like the element14 Community. Here, we're interested in lots of different types of computers, microprocessors, systems and platforms; and most all of them involve some manner of digital security measures. A campaign that originally looked at encouraging people to change one, or maybe two passwords now involves something of an epic security endeavour for engineers, makers and tech-heads who are into all the available prototyping platforms out there now.

 

So is it also time to change the password on your Raspberry Pi root? Should your Internet of Things devices get a new login? Are there any concerns around your connected Arduino projects?

 

Updating a Windows password is easy, but updating a headless single board computer or homemade connected thermostat or wi-fi operated light fitting is something else entirely. Even those of us who take an active interest in these things might struggle to keep up to speed on every item we've built into a maker project.

 

So I'd like to encourage those of you in the know to pick a platform or process of your choice, and write a blog detailing how to change or update its passwords, logins or security features.

 

Tag it with "Computer Security Day" (and put a link to it in the comments here, if you like) and we'll compile all your cyber security instructions into a cyber security bible that will help keep our corner of the internet just a little bit safer. If we can enough blog posts together on the subject of cyber security, we could potentially edit these into an e-book that'll become a valuable reference for all of us.

 


 

Don't forget! Now that you've secured your digital self, come and tell us how you can make yourself and others safe and sound in the physical world, in our brand new Safe and Sound Design Challenge.

 

You could win a nice, safe quadcopter with which to "enhance" your neighbour's security and privacy!

  • Sign in to reply

Top Comments

  • Jan Cumps
    Jan Cumps over 9 years ago +3
    My wish is that each IoT Hardware & Software supplier incorporates security in their "Out of Box" example. No more "Hello, world!" examples that are unsafe! That's the first step to get designers booted…
  • jgerred
    jgerred over 9 years ago +2
    Security is a trade off between being secure and being usable. If you buy a new computer, take it home, dig a hole 60 feet deep, put the new computer (still in the box) in the bottom of the hole, and then…
  • DAB
    DAB over 9 years ago +1
    All of my devices are reasonably secure because I always turn them off when I am done. It is difficult to hack a device that is physically not available for exploitation. DAB
  • Jan Cumps
    Jan Cumps over 9 years ago in reply to DAB +1
    I kindly don't agree, DAB. A device is only safe when safety is part of the design. Your solution puts the burden on the user. A user can be anyone, skilled or not. It should be on the hardware+software…
  • DAB
    DAB over 9 years ago in reply to Jan Cumps +1
    True, but I am lazy and it has worked for about 40 years of computer use. If you want true computer security, then it needs to be automatic and transparent to the user. The biggest weakness in the ENIGMA…
  • clem57
    clem57 over 9 years ago in reply to DAB +1
    Not so true since quite a few are human engineering from the outside. See http://www.paramecium.org/~leendert/publications/nluug1992.pdf Clem
  • Jan Cumps
    Jan Cumps over 9 years ago in reply to DAB +1
    ... and I accept that, DAB. In the world of IoT, a big (I don't want to vote for the biggest) weakness is that the experts give the non-experts unsafe examples to start with - as if that's the normal way…
  • mcb1
    mcb1 over 9 years ago in reply to Jan Cumps +1
    The EnOcean device packets are encrypted ... but they aren't really connected to the internet.
  • Jan Cumps
    Jan Cumps over 9 years ago in reply to jgerred +1
    James, doesn't your rule ignore the responsibility of the IoT device itself to be secured, and put security care "in someone else's well secured device"? That may be good enough if you build for yourself…
  • jgerred
    jgerred over 9 years ago in reply to Jan Cumps +1
    Well, like I said in my post " With regards to the IoT ongoing issues, security should be thought of from the start.", in my opinion the manufacturers and folks that build devices for others should think…
Parents
  • DAB
    DAB over 9 years ago

    All of my devices are reasonably secure because I always turn them off when I am done.

     

    It is difficult to hack a device that is physically not available for exploitation.

     

    DAB

    • Cancel
    • Vote Up +1 Vote Down
    • Sign in to reply
    • More
    • Cancel
  • Jan Cumps
    Jan Cumps over 9 years ago in reply to DAB

    I kindly don't agree, DAB.

    A device is only safe when safety is part of the design.

     

    Your solution puts the burden on the user.

    A user can be anyone, skilled or not.

    It should be on the hardware+software providers, and on the sellers and designers.

    Security can't be off-loaded in my (very not humble) opinion....

    • Cancel
    • Vote Up +1 Vote Down
    • Sign in to reply
    • More
    • Cancel
  • DAB
    DAB over 9 years ago in reply to Jan Cumps

    True, but I am lazy and it has worked for about 40 years of computer use.

     

    If you want true computer security, then it needs to be automatic and transparent to the user.

     

    The biggest weakness in the ENIGMA machine in WWII was operators not following procedures.

     

    To quote Henry Ford "It is impossible to make anything idiot proof, because idiots are too ingenious!"

     

    That sentiment holds true for security.  Only the people responsible can keep a secret.  Controlling access is the only way to limit unwanted disclosure.

     

    Most security breaks have always been inside jobs.

     

    DAB

    • Cancel
    • Vote Up +1 Vote Down
    • Sign in to reply
    • More
    • Cancel
  • COMPACT
    COMPACT over 9 years ago in reply to DAB

    From memory it was Tunny (Lorenz ciphers) and not Enigma that was broken from an operator using an incorrect procedure.

    Apparently Terry Flowers was never reimbursed by the British Govt for the costs he personally incurred acquiring parts for Colossus.

    • Cancel
    • Vote Up 0 Vote Down
    • Sign in to reply
    • More
    • Cancel
  • Jan Cumps
    Jan Cumps over 9 years ago in reply to COMPACT

    In the IoT world, the inventors teach you how to use the devices unsafe.

     

    Even if they have safety features built in.

     

    Challenge:show a supplier 'connected' example that's (reasonable) end-to-end safe from IoT device to the Internet.

    First approximately correct answer gets a non-connected, not-used development board delivered at home.

    • Cancel
    • Vote Up 0 Vote Down
    • Sign in to reply
    • More
    • Cancel
Comment
  • Jan Cumps
    Jan Cumps over 9 years ago in reply to COMPACT

    In the IoT world, the inventors teach you how to use the devices unsafe.

     

    Even if they have safety features built in.

     

    Challenge:show a supplier 'connected' example that's (reasonable) end-to-end safe from IoT device to the Internet.

    First approximately correct answer gets a non-connected, not-used development board delivered at home.

    • Cancel
    • Vote Up 0 Vote Down
    • Sign in to reply
    • More
    • Cancel
Children
  • mcb1
    mcb1 over 9 years ago in reply to Jan Cumps

    The EnOcean device packets are encrypted ... but they aren't really connected to the internet.

    • Cancel
    • Vote Up +1 Vote Down
    • Sign in to reply
    • More
    • Cancel
  • COMPACT
    COMPACT over 9 years ago in reply to mcb1

    But in Australia they'll transmit on one of our Cell phone frequency ranges!!

    • Cancel
    • Vote Up 0 Vote Down
    • Sign in to reply
    • More
    • Cancel
  • mcb1
    mcb1 over 9 years ago in reply to COMPACT

    But in Australia they'll transmit on one of our Cell phone frequency ranges!!

    Well then you can listen to the jubble ...

     

    I highlighted this in earlier discussions ...

    Sometimes the security of the packet is not the problem, it's the mere presecence of a packet that comprimises the security.

     

    If a criminal wants to target people returning to cars, then he only needs to detect the prescence of data.

    Obviously the chances of identifying the car is reduced with the number of cars in the car park.

     

    In this example there is no comprimise of the data, just the fact it is there.

     

    Mark

    • Cancel
    • Vote Up 0 Vote Down
    • Sign in to reply
    • More
    • Cancel
element14 Community

element14 is the first online community specifically for engineers. Connect with your peers and get expert answers to your questions.

  • Members
  • Learn
  • Technologies
  • Challenges & Projects
  • Products
  • Store
  • About Us
  • Feedback & Support
  • FAQs
  • Terms of Use
  • Privacy Policy
  • Legal and Copyright Notices
  • Sitemap
  • Cookies

An Avnet Company © 2025 Premier Farnell Limited. All Rights Reserved.

Premier Farnell Ltd, registered in England and Wales (no 00876412), registered office: Farnell House, Forge Lane, Leeds LS12 2NE.

ICP 备案号 10220084.

Follow element14

  • X
  • Facebook
  • linkedin
  • YouTube