The Internet of Things will make Big Data data centers turn into Large Data?
In the modern world, Big Data not only takes data on the volume, but also on the meaning. A special role in the development of Big Data is played by the Internet of Things, which allows you to collect data from subsequent sources and analyze new aspects of our world.
Surely you've heard about the Internet of Things. Refrigerator, informing you that the eggs have run out; shoes that tell you how far you traveled; the car is currently collecting data on local traffic so that you know which roads to avoid; a house saying how much water or heating was used. That's what it's all about.
Business focuses primarily on data: The TechRadar Pro report says that the Internet of Things by 2018 will result in a year of increase in IP traffic to 1.6 zetabytes - an increase of 300% compared to data from 2013. It follows that the traffic will be grew by 132 exabytes a month until 2018.
Importantly, according to the report, most of the traffic will not be generated by computers but by wireless devices such as smartphones and of course sensors that connect these "things" to the internet.
More data, more connections, more threats
One of the most important aspects that can often be overlooked is DNS, which is the starting point for Internet of Things connections. It must be remembered that the more devices, the more connections, and thus the suppliers must try to make the DNS infrastructure meet the increased number of queries.
Of course, with the increase of devices connected to your network, the number of threats increases. Every new device connected to the Internet means a new way to your network for cybercriminals and more opportunities to steal private data. For example, a DDoS attack can be much more harmful considering the number of devices from which it can be made. Until now, the botnet - infected devices that can be controlled remotely by a hacker - consisted of computers. At the moment, other internet-based devices can reach it, making the DDoS attack generated by them can be significantly more serious.
The Internet of Things is much harder to protect against attacks, because the traditional outline of the data center ceases to exist. Data moves between different devices along different networks to different data centers. This means that we must be able to provide them with uninterrupted protection. It will be necessary to adapt the Internet of Things security structure to a multi-layered approach to ensure protection from one end to another. From firewalls at the application layer level, to access management, remote access security and everything that is in between.
Threats yesterday and today
We remember the days when hacking was something that people did because they could just do it. It was not done for fun, people wanted to show their skills. Often hacking was harmless, someone broke into the system and left his business card, otherwise the losses were very small. It was mainly for the thrill of thrill.
Currently, it looks completely different. Hackers and cybercriminals can be highly paid and well organized, and their goals can be anything from money, intellectual property to disrupting the service.
There are also cyber criminals who work only for money. Let's look at the recent data breach of Target, for example. Email containing malware was sent to HVAC, which works with Target, one of the largest retailers in America. Using the stolen passwords, cybercriminals got access to detailed information about credit and debit cards and to other private data of nearly 110 million people.
The threat to the systems comes from various sources and takes place for various reasons. That is why companies need to be adequately protected. As this is not a scientific field, companies need to find out what attacks they can target. Some of them are vulnerable to specific types of attacks more than others, and the Internet of Things gives cyber criminals additional room for maneuver.
Author: Ireneusz Wiśniewski, Country Manager Poland, F5 Networks
Learn more about our offer
We use Google Cloud Translation and Gengo API’s to translate articles with exception of our comparative tests.