FBIs Portland Office Spies IoT Education Opportunity

  /     /     /  
Publicated : 23/11/2024   Category : security


FBIs Portland Office Spies IoT Education Opportunity


The Federal Bureau of Investigations office in Portland, Ore., uses Tech Tuesday to offer IoT security advice.



The Federal Bureau of Investigation’s office in Portland, Oregon has started an effort that it calls Tech Tuesday to disseminate actionable security advice to users.
Last week
it got around to the Internet of Things (IoT).
The FBI concentrated its advice on limiting an IoT devices access to the Internet router that it uses, since an attacker can leverage the unimpeded path to the enterprise network that can be provided by a WiFi router for malicious activity. As far as the router itself goes, they strongly -- and wisely -- advise changing the routers factory administrative settings from the default passwords. The new passwords should be strong enough to protect the router as well.
However, the network itself needs to be secured. As Portland put it, Keep your most private, sensitive data on a separate system from your other IoT devices.
Many unsophisticated users will think that this means two separate routers will be needed to establish the two differing networks. That approach will indeed work, but there is a better one.
Micro-segmentation has been around in WiFi routers for a while. It enables a routers admin to create a virtual network (VLAN) which will act as different network than the primary one; even if they are resident on the same physical router. The enterprise could isolate other network-using devices with this technique such as printers, which have been hijacked in much the same way as a router can be.
Router maker Ubiquiti
has blogged
about the specific steps needed to create such a VLAN. First, the VLAN is created and IDd. A Gateway/Subnet tag is then selected for it. Establishing a DHCP service map between the ports on the router and the IP of connected clients is the next task.
Activate the VLAN with all the choices that have made by assigning it a port on the router.
The last major step is to block traffic from the new VLAN to other networks. This is done by changing the firewall of the router. It is necessary to create a new rule for the firewall that includes the identity of the network that you wish blocked from communication with the other. If done right, all traffic from all other networks to the new network is allowed, but no traffic is allowed to be initiated from the new IoT VLAN to the sensitive network that is connected.
The FBIs Oregon office is trying to bring security to users, and for that it should be commended. But the simple format that it uses in this effort may need more detail about things that can be done, and where users should go to get them done.
— Larry Loeb has written for many of the last centurys major dead tree computer magazines, having been, among other things, a consulting editor for BYTE magazine and senior editor for the launch of WebWeek.

Last News

▸ ArcSight prepares for future at user conference post HP acquisition. ◂
Discovered: 07/01/2025
Category: security

▸ Samsung Epic 4G: First To Use Media Hub ◂
Discovered: 07/01/2025
Category: security

▸ Many third-party software fails security tests ◂
Discovered: 07/01/2025
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
FBIs Portland Office Spies IoT Education Opportunity