An e-business strategy involves changing business functions and operations into web-enabled applications, including marketing and selling goods/services on the internet
As businesses shift to the Internet, they increase their exposure to online risks, threats, and vulnerabilities.
Security controls companies must implement:
secure front-end and backend systems
secure web-applications
the encryption of customer data
Issues with mobile computing:
network speed
usability
security
Growing use of personal devices (BYOD) in the workplace has lower price and operation costs. However, the nature of BYOD can open door to security issues.
Security Issues with IoT devices:
deployed in large quantities; an outage could impact many endpoints if attacked
ubiquitous and can have wide reach into the user or household population
lack of maintenance or updates allow vulnerabilities
upgrades can be difficult to distribute and deploy
typically do not provide owner or user internal visibility/knowledge of how a device works
usually not physically secure
environmental IoT devices capture readings and measurements in the open
Privacy challenges that must be addressed by manufacturers and defined in the right-of-use and software End-User Licensing Agreement (EULA) include:
Privacy policy statement – actual legal definition of user's privacy rights
Definition of data, metadata, or analytical data use and rights
Ability for a user to provide consent to a manufacturer’s or application service provider’s privacy policy statement
Interoperability: the ability of computer systems or software to exchange and make use of information
The goal of manufacturers is to bring down the cost of IoT devices and supporting applications so they are affordable. Interoperability drives down the cost of IoT implementation, and thus has significant financial impacts if not properly addressed.
Here are the key challenges that must be addressed with interoperability and standards:
Some manufacturers want to design and deploy proprietary IoT devices and solutions
Cost factors to implement functional, operational, technical, and security capabilities into IoT devices and applications
Time-to-market risk
Technology outdated risk
A void in interoperability and standards for IoT devices can create an environment of bad IoT devices
Privacy data is subject to the privacy laws of the state you live in and the state where the IoT hosting company is located