{"id":313,"date":"2019-01-10T15:08:09","date_gmt":"2019-01-10T15:08:09","guid":{"rendered":"https:\/\/www.codemotion.com\/magazine\/security-in-the-iot-generation-the-guy-rombaut-point-of-view\/"},"modified":"2021-08-11T18:38:33","modified_gmt":"2021-08-11T16:38:33","slug":"security-in-the-iot-generation-the-guy-rombaut-point-of-view","status":"publish","type":"post","link":"https:\/\/www.codemotion.com\/magazine\/uncategorized\/security-in-the-iot-generation-the-guy-rombaut-point-of-view\/","title":{"rendered":"Security in the IoT generation: the Guy Rombaut point of view"},"content":{"rendered":"<p><span class=\"firstcharacter\">T<\/span>he world is increasingly interconnected through the <span id=\"urn:batch-analysis-35077f3c-d939-4a9b-a606-a49681c888db\" class=\"textannotation disambiguated wl-no-link wl-other\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/internet\">internet<\/span>. More and more &#8220;smart&#8221; devices and appliances are now online 24 hours a day. But what are the real implications of the development of IoT and home automation? Are users really safe? What is the level of protection for their <span id=\"urn:batch-analysis-7cc8ed91-e419-4ea5-8100-2e01b2ffc12b\" class=\"textannotation disambiguated wl-no-link wl-other\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/data\">data<\/span>? And what are the biggest risks to privacy?<\/p>\n<p>During Codemotion Milan 2018, Guy Rombaut, <a class=\"wpil_keyword_link\" href=\"https:\/\/www.codemotion.com\/magazine\/dev-hub\/cto\/how-to-become-cto\/\" target=\"_blank\" rel=\"noopener\" title=\"CTO\" data-wpil-keyword-link=\"linked\">CTO<\/a> at OneFit, spoke to us in depth about these issues.<\/p>\n<p>There are now many low-cost devices always connected and already installed in the workplace and home. Exposing these devices to the <span id=\"urn:batch-analysis-da063654-e608-43cf-9a3e-8b86b52b0bd3\" class=\"textannotation disambiguated wl-no-link wl-other\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/internet\">internet<\/span> without precautions and without sensitising the users to their implications is a big risk. In addition to the possible violations of individual privacy, there is also a more relevant aspect concerning security.<\/p>\n<p>In the absence of the necessary countermeasures, malicious users could take possession of our &#8220;smart&#8221; car, or turn off the electricity of a home remotely, or lock us out of the house. This is the potential downside of the domotics and IoT devices.<\/p>\n<p>The well-known Ransomware WannaCry is a striking example of how cybersecurity is a topic too often ignored today. Although there is a lot of work being done in schools to make students aware of cybersecurity, very often the most basic security rules are not applied as much by individual users as by <span id=\"urn:batch-analysis-5cd723ae-f7b3-4c89-ae80-80878503888a\" class=\"textannotation disambiguated wl-no-link wl-other\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/ember_company\">companies<\/span>. So can a secure smart system be implemented? Obviously, yes. Just follow some basic rules that should be applied by all manufacturers on the market:<\/p>\n<p>Always employ staff specialised in <a href=\"https:\/\/www.codemotion.com\/magazine\/dev-hub\/security-manager\/web-app-security-tools\/\" target=\"_blank\" rel=\"noopener\">web security<\/a> during development. Working with developers already accustomed to the use of normal security protocols will improve the <span id=\"urn:batch-analysis-44461fa3-ab51-4d68-8fd4-2cbcc0877efc\" class=\"textannotation disambiguated wl-no-link wl-other\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/security\">security<\/span> of your <span id=\"urn:batch-analysis-2dea4090-cdf3-454c-9c95-d82a7fa4f512\" class=\"textannotation disambiguated wl-no-link wl-other\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/project\">project<\/span> and your service. This is because having a good <span id=\"urn:batch-analysis-75a7f16a-8182-4f58-8d76-fd0b40aed15e\" class=\"textannotation disambiguated wl-no-link wl-other\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/knowledge\">knowledge<\/span> of the rules of cybersecurity will mean you implement them during the early stages of development. Present the <span id=\"urn:batch-analysis-5e88b333-8b1e-4ba0-927a-20b4cd62c133\" class=\"textannotation disambiguated wl-no-link wl-other\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/project\">project<\/span> in production, already prepared for the implementation of the right security protocols.<\/p>\n<p>Prioritize security and security features of the device before sending it to production. This will protect not only the end user but also the <span id=\"urn:batch-analysis-01ca8344-19e5-4ae0-a25c-174464f64f9f\" class=\"textannotation disambiguated wl-no-link wl-other\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/ember_company\">company<\/span> itself from possible future security problems. Another important factor in ensuring the <span id=\"urn:batch-analysis-7377a142-c157-461e-8080-3d8c8fe775e9\" class=\"textannotation disambiguated wl-no-link wl-other\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/security\">security<\/span> of an IoT system is to ensure constant updates, for the entire lifecycle of the device. Moreover, it\u2019s very important to ensure that the device updates automatically without requiring user intervention. Eliminating the need for manual intervention for the update allows you to not only improve the <span id=\"urn:batch-analysis-86d86285-4677-46b5-8a96-63dd82fb0d24\" class=\"textannotation disambiguated wl-no-link wl-other\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/user_experience\">user experience<\/span> but also to prevent the user from postponing the update.<\/p>\n<p><span id=\"urn:batch-analysis-e99f5031-f4ed-4387-9815-89fcae27ef46\" class=\"textannotation disambiguated wl-no-link wl-other\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/security\">Security<\/span> obviously goes through cryptographic algorithms. Use data encryption algorithms during communications to and from the device and to store <span id=\"urn:batch-analysis-419bbabb-19d9-4dcd-b30e-dff1a76d2cfe\" class=\"textannotation disambiguated wl-no-link wl-other\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/password\">passwords<\/span>; it\u2019s key to ensuring that user data is kept and stored in a stable and secure manner. For example, you can create web apps for your IoT device which always use the HTTPS protocol, so as to protect its users with an SSL or TLS certificate.<\/p>\n<p>Although it is possible to implement a vast array of protocols, one of the main security risks remains the user themselves. That&#8217;s why you have to oblige the user to set a strong <span id=\"urn:batch-analysis-85233bd2-ae12-4c19-9d43-0a48f168fa23\" class=\"textannotation disambiguated wl-no-link wl-other\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/password\">password<\/span>, to change it at least once a year and to activate the two-factor verification. The development team will also have to implement and use smart methods to recover login credentials.<\/p>\n<p>Once you get to the stable version of the <span id=\"urn:batch-analysis-c1d8e143-0e83-4b1c-a47f-7129f6691a09\" class=\"textannotation disambiguated wl-no-link wl-other\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/cogito_software\">software<\/span>, it is good to perform, as well as during the whole life cycle of the device, various <span id=\"urn:batch-analysis-4b17f54d-20f2-4e6f-95b5-37486a11679f\" class=\"textannotation disambiguated wl-no-link wl-other\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/penetration_test\">penetration tests<\/span> to ensure that the implementing security protocols work well.<\/p>\n<p>In addition, a <span id=\"urn:batch-analysis-79656c9e-fa87-455c-a34a-12597856a3b6\" class=\"textannotation disambiguated wl-no-link wl-other\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/ember_company\">company<\/span> that makes IoT devices should never use a &#8220;default&#8221; password in the factory settings. This is because users often do not change the <span id=\"urn:batch-analysis-4eab93fb-1439-4c5f-ba31-a26343e54b9e\" class=\"textannotation disambiguated wl-no-link wl-other\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/password\">password<\/span> if not forced. Leaving a standard <span id=\"urn:batch-analysis-8627ba19-c51f-48e5-be13-96af1fa16913\" class=\"textannotation disambiguated wl-no-link wl-other\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/password\">password<\/span> on the device is like leaving the door open at home day and night. Another fatal mistake that a development team can make is to implement secret and undocumented remote access methods such as backdoors. This hidden remote access does nothing but make the attack platform wider and, if discovered by a hacker, can lead to intrusions against which you can not defend.<\/p>\n<p>At the end of his talk, Guy Rombaut showed us how easy it is to get the <span id=\"urn:batch-analysis-ebb319f7-168b-43f4-a9db-b29c158976e6\" class=\"textannotation disambiguated wl-no-link wl-other\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/password\">password<\/span> of a device that has not been designed with the right security protocols. He looked for a simple target like a public webcam and, after finding the public IP, he used logic and an open source tool, nmap, to understand the username and password to access the webcam control panel.<\/p>\n<p>Nmap can be used to discover hosts and services on a computer network, thus building a &#8220;map&#8221; of the network. To accomplish its goal, Nmap sends specially crafted packets to the target host(s) and then analyses the responses. For example, Rombaut scans the network in this way:<\/p>\n<p>nmap -T4 -A -v 192.168.0.0\/24 -p 21, 75-100,443, 554, 22222, 3322,3333, 5000, 5550, 8080, 8081, 100002<\/p>\n<p>With this simple command, he scanned the network, looking for a <span id=\"urn:batch-analysis-5049e50a-126f-432d-b280-d1259eb21b44\" class=\"textannotation disambiguated wl-no-link wl-other\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/web_server\">web server<\/span> that queried then returned the <span id=\"urn:batch-analysis-1ab9b59f-52fd-4926-975d-6eed90646cf4\" class=\"textannotation disambiguated wl-no-link wl-other\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/password\">password<\/span> and the username set by default (admin\/1234). But it is also possible to exploit the simpler bugs of JavaScript code on the access page of these devices. For example, by connecting to a web page using the browser&#8217;s developer tools, you can invoke the GetCurPwd () function and return the corresponding value &#8220;admin123345&#8221;.<\/p>\n<p>Now imagine that this system is not a simple public webcam but for your  car or the door of your home. Can you comprehend how great the risks of an IoT ecosystem without security standards are?<\/p>\n<p>So a truly safe IoT system should always have three characteristics:confidentiality, integrity and availability, also known as the CIA triad, is a model designed to guide policies for information security within an organisation. The model is also sometimes referred to as the AIC triad (availability, integrity and confidentiality) to avoid confusion with the Central Intelligence Agency. The elements of the triad are considered the three most crucial components of <span id=\"urn:batch-analysis-5d92299b-2f34-4e03-9264-05e375f78ce7\" class=\"textannotation disambiguated wl-no-link wl-other\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/security\">security<\/span>.<\/p>\n<p>In this context, confidentiality is a set of rules that limits access to information, integrity is the assurance that the information is trustworthy and accurate, and availability is a guarantee of reliable access to the information by authorised people.<\/p>\n<p>In addition, our devices should always be able to be controlled by something that can be directly associated with us, such as another device or biometric values (fingerprints or face ID).<\/p>\n<p>In conclusion, Guy Rombaut hopes that all developers and users will start to become more aware of the risks of the IoT world and put pressure on <span id=\"urn:batch-analysis-ec58751c-d812-425f-a347-3e53ac124a5f\" class=\"textannotation disambiguated wl-no-link wl-other\" itemid=\"http:\/\/data.wordlift.io\/wl01770\/entity\/ember_company\">companies<\/span> to implement ever better security systems.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The world is increasingly interconnected through the internet. More and more &#8220;smart&#8221; devices and appliances are now online 24 hours a day. But what are the real implications of the development of IoT and home automation? Are users really safe? What is the level of protection for their data? And what are the biggest risks&#8230; <a class=\"more-link\" href=\"https:\/\/www.codemotion.com\/magazine\/uncategorized\/security-in-the-iot-generation-the-guy-rombaut-point-of-view\/\">Read more<\/a><\/p>\n","protected":false},"author":35,"featured_media":314,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_editorskit_title_hidden":false,"_editorskit_reading_time":0,"_editorskit_is_block_options_detached":false,"_editorskit_block_options_position":"{}","_uag_custom_page_level_css":"","_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[],"tags":[22,38],"collections":[],"class_list":{"0":"post-313","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"tag-codemotion-milan","8":"tag-security-manager","9":"entry"},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.9 (Yoast SEO v26.9) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Security in the IoT generation: the Guy Rombaut point of view - Codemotion Magazine<\/title>\n<meta name=\"description\" content=\"Codemotion and Facebook organized the Tech Leadership Training boot camp, heres a personal reportage from one of our attendees.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.codemotion.com\/magazine\/uncategorized\/security-in-the-iot-generation-the-guy-rombaut-point-of-view\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security in the IoT generation: the Guy Rombaut point of view\" \/>\n<meta property=\"og:description\" content=\"Codemotion and Facebook organized the Tech Leadership Training boot camp, heres a personal reportage from one of our attendees.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.codemotion.com\/magazine\/uncategorized\/security-in-the-iot-generation-the-guy-rombaut-point-of-view\/\" \/>\n<meta property=\"og:site_name\" content=\"Codemotion Magazine\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Codemotion.Italy\/\" \/>\n<meta property=\"article:published_time\" content=\"2019-01-10T15:08:09+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-08-11T16:38:33+00:00\" \/>\n<meta name=\"author\" content=\"Claudio Davide Ferrara\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/01\/security.jpg\" \/>\n<meta name=\"twitter:creator\" content=\"@CodemotionIT\" \/>\n<meta name=\"twitter:site\" content=\"@CodemotionIT\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Claudio Davide Ferrara\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.codemotion.com\/magazine\/uncategorized\/security-in-the-iot-generation-the-guy-rombaut-point-of-view\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.codemotion.com\/magazine\/uncategorized\/security-in-the-iot-generation-the-guy-rombaut-point-of-view\/\"},\"author\":{\"name\":\"Claudio Davide Ferrara\",\"@id\":\"https:\/\/www.codemotion.com\/magazine\/#\/schema\/person\/7e126fb002c44ab81b24ee243dc2a86d\"},\"headline\":\"Security in the IoT generation: the Guy Rombaut point of view\",\"datePublished\":\"2019-01-10T15:08:09+00:00\",\"dateModified\":\"2021-08-11T16:38:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.codemotion.com\/magazine\/uncategorized\/security-in-the-iot-generation-the-guy-rombaut-point-of-view\/\"},\"wordCount\":1097,\"publisher\":{\"@id\":\"https:\/\/www.codemotion.com\/magazine\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.codemotion.com\/magazine\/uncategorized\/security-in-the-iot-generation-the-guy-rombaut-point-of-view\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/01\/security.jpg\",\"keywords\":[\"Codemotion Milan\",\"Security Manager\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.codemotion.com\/magazine\/uncategorized\/security-in-the-iot-generation-the-guy-rombaut-point-of-view\/\",\"url\":\"https:\/\/www.codemotion.com\/magazine\/uncategorized\/security-in-the-iot-generation-the-guy-rombaut-point-of-view\/\",\"name\":\"Security in the IoT generation: the Guy Rombaut point of view - Codemotion Magazine\",\"isPartOf\":{\"@id\":\"https:\/\/www.codemotion.com\/magazine\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.codemotion.com\/magazine\/uncategorized\/security-in-the-iot-generation-the-guy-rombaut-point-of-view\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.codemotion.com\/magazine\/uncategorized\/security-in-the-iot-generation-the-guy-rombaut-point-of-view\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/01\/security.jpg\",\"datePublished\":\"2019-01-10T15:08:09+00:00\",\"dateModified\":\"2021-08-11T16:38:33+00:00\",\"description\":\"Codemotion and Facebook organized the Tech Leadership Training boot camp, heres a personal reportage from one of our attendees.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.codemotion.com\/magazine\/uncategorized\/security-in-the-iot-generation-the-guy-rombaut-point-of-view\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.codemotion.com\/magazine\/uncategorized\/security-in-the-iot-generation-the-guy-rombaut-point-of-view\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.codemotion.com\/magazine\/uncategorized\/security-in-the-iot-generation-the-guy-rombaut-point-of-view\/#primaryimage\",\"url\":\"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/01\/security.jpg\",\"contentUrl\":\"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/01\/security.jpg\",\"width\":1000,\"height\":667,\"caption\":\"automation, security, cybersecurity certifications\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.codemotion.com\/magazine\/uncategorized\/security-in-the-iot-generation-the-guy-rombaut-point-of-view\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.codemotion.com\/magazine\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security Manager\",\"item\":\"https:\/\/www.codemotion.com\/magazine\/tag\/security-manager\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Security in the IoT generation: the Guy Rombaut point of view\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.codemotion.com\/magazine\/#website\",\"url\":\"https:\/\/www.codemotion.com\/magazine\/\",\"name\":\"Codemotion Magazine\",\"description\":\"We code the future. Together\",\"publisher\":{\"@id\":\"https:\/\/www.codemotion.com\/magazine\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.codemotion.com\/magazine\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.codemotion.com\/magazine\/#organization\",\"name\":\"Codemotion\",\"url\":\"https:\/\/www.codemotion.com\/magazine\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.codemotion.com\/magazine\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/11\/codemotionlogo.png\",\"contentUrl\":\"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/11\/codemotionlogo.png\",\"width\":225,\"height\":225,\"caption\":\"Codemotion\"},\"image\":{\"@id\":\"https:\/\/www.codemotion.com\/magazine\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/Codemotion.Italy\/\",\"https:\/\/x.com\/CodemotionIT\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.codemotion.com\/magazine\/#\/schema\/person\/7e126fb002c44ab81b24ee243dc2a86d\",\"name\":\"Claudio Davide Ferrara\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.codemotion.com\/magazine\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/abd7b110a5518b2f0154fdfb31cefbad4892317672726b9c38c3cd16af635abb?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/abd7b110a5518b2f0154fdfb31cefbad4892317672726b9c38c3cd16af635abb?s=96&d=mm&r=g\",\"caption\":\"Claudio Davide Ferrara\"},\"description\":\"I collaborate with HTML.it as news editor, writing news on the world of Information Technology, domotics, IoT, free software and Linux distributions.\",\"url\":\"https:\/\/www.codemotion.com\/magazine\/author\/claudio-davide-ferrara\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Security in the IoT generation: the Guy Rombaut point of view - Codemotion Magazine","description":"Codemotion and Facebook organized the Tech Leadership Training boot camp, heres a personal reportage from one of our attendees.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.codemotion.com\/magazine\/uncategorized\/security-in-the-iot-generation-the-guy-rombaut-point-of-view\/","og_locale":"en_US","og_type":"article","og_title":"Security in the IoT generation: the Guy Rombaut point of view","og_description":"Codemotion and Facebook organized the Tech Leadership Training boot camp, heres a personal reportage from one of our attendees.","og_url":"https:\/\/www.codemotion.com\/magazine\/uncategorized\/security-in-the-iot-generation-the-guy-rombaut-point-of-view\/","og_site_name":"Codemotion Magazine","article_publisher":"https:\/\/www.facebook.com\/Codemotion.Italy\/","article_published_time":"2019-01-10T15:08:09+00:00","article_modified_time":"2021-08-11T16:38:33+00:00","author":"Claudio Davide Ferrara","twitter_card":"summary_large_image","twitter_image":"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/01\/security.jpg","twitter_creator":"@CodemotionIT","twitter_site":"@CodemotionIT","twitter_misc":{"Written by":"Claudio Davide Ferrara","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.codemotion.com\/magazine\/uncategorized\/security-in-the-iot-generation-the-guy-rombaut-point-of-view\/#article","isPartOf":{"@id":"https:\/\/www.codemotion.com\/magazine\/uncategorized\/security-in-the-iot-generation-the-guy-rombaut-point-of-view\/"},"author":{"name":"Claudio Davide Ferrara","@id":"https:\/\/www.codemotion.com\/magazine\/#\/schema\/person\/7e126fb002c44ab81b24ee243dc2a86d"},"headline":"Security in the IoT generation: the Guy Rombaut point of view","datePublished":"2019-01-10T15:08:09+00:00","dateModified":"2021-08-11T16:38:33+00:00","mainEntityOfPage":{"@id":"https:\/\/www.codemotion.com\/magazine\/uncategorized\/security-in-the-iot-generation-the-guy-rombaut-point-of-view\/"},"wordCount":1097,"publisher":{"@id":"https:\/\/www.codemotion.com\/magazine\/#organization"},"image":{"@id":"https:\/\/www.codemotion.com\/magazine\/uncategorized\/security-in-the-iot-generation-the-guy-rombaut-point-of-view\/#primaryimage"},"thumbnailUrl":"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/01\/security.jpg","keywords":["Codemotion Milan","Security Manager"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.codemotion.com\/magazine\/uncategorized\/security-in-the-iot-generation-the-guy-rombaut-point-of-view\/","url":"https:\/\/www.codemotion.com\/magazine\/uncategorized\/security-in-the-iot-generation-the-guy-rombaut-point-of-view\/","name":"Security in the IoT generation: the Guy Rombaut point of view - Codemotion Magazine","isPartOf":{"@id":"https:\/\/www.codemotion.com\/magazine\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.codemotion.com\/magazine\/uncategorized\/security-in-the-iot-generation-the-guy-rombaut-point-of-view\/#primaryimage"},"image":{"@id":"https:\/\/www.codemotion.com\/magazine\/uncategorized\/security-in-the-iot-generation-the-guy-rombaut-point-of-view\/#primaryimage"},"thumbnailUrl":"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/01\/security.jpg","datePublished":"2019-01-10T15:08:09+00:00","dateModified":"2021-08-11T16:38:33+00:00","description":"Codemotion and Facebook organized the Tech Leadership Training boot camp, heres a personal reportage from one of our attendees.","breadcrumb":{"@id":"https:\/\/www.codemotion.com\/magazine\/uncategorized\/security-in-the-iot-generation-the-guy-rombaut-point-of-view\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.codemotion.com\/magazine\/uncategorized\/security-in-the-iot-generation-the-guy-rombaut-point-of-view\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.codemotion.com\/magazine\/uncategorized\/security-in-the-iot-generation-the-guy-rombaut-point-of-view\/#primaryimage","url":"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/01\/security.jpg","contentUrl":"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/01\/security.jpg","width":1000,"height":667,"caption":"automation, security, cybersecurity certifications"},{"@type":"BreadcrumbList","@id":"https:\/\/www.codemotion.com\/magazine\/uncategorized\/security-in-the-iot-generation-the-guy-rombaut-point-of-view\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.codemotion.com\/magazine\/"},{"@type":"ListItem","position":2,"name":"Security Manager","item":"https:\/\/www.codemotion.com\/magazine\/tag\/security-manager\/"},{"@type":"ListItem","position":3,"name":"Security in the IoT generation: the Guy Rombaut point of view"}]},{"@type":"WebSite","@id":"https:\/\/www.codemotion.com\/magazine\/#website","url":"https:\/\/www.codemotion.com\/magazine\/","name":"Codemotion Magazine","description":"We code the future. Together","publisher":{"@id":"https:\/\/www.codemotion.com\/magazine\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.codemotion.com\/magazine\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.codemotion.com\/magazine\/#organization","name":"Codemotion","url":"https:\/\/www.codemotion.com\/magazine\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.codemotion.com\/magazine\/#\/schema\/logo\/image\/","url":"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/11\/codemotionlogo.png","contentUrl":"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/11\/codemotionlogo.png","width":225,"height":225,"caption":"Codemotion"},"image":{"@id":"https:\/\/www.codemotion.com\/magazine\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/Codemotion.Italy\/","https:\/\/x.com\/CodemotionIT"]},{"@type":"Person","@id":"https:\/\/www.codemotion.com\/magazine\/#\/schema\/person\/7e126fb002c44ab81b24ee243dc2a86d","name":"Claudio Davide Ferrara","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.codemotion.com\/magazine\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/abd7b110a5518b2f0154fdfb31cefbad4892317672726b9c38c3cd16af635abb?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/abd7b110a5518b2f0154fdfb31cefbad4892317672726b9c38c3cd16af635abb?s=96&d=mm&r=g","caption":"Claudio Davide Ferrara"},"description":"I collaborate with HTML.it as news editor, writing news on the world of Information Technology, domotics, IoT, free software and Linux distributions.","url":"https:\/\/www.codemotion.com\/magazine\/author\/claudio-davide-ferrara\/"}]}},"featured_image_src":"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/01\/security-600x400.jpg","featured_image_src_square":"https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/01\/security-600x600.jpg","author_info":{"display_name":"Claudio Davide Ferrara","author_link":"https:\/\/www.codemotion.com\/magazine\/author\/claudio-davide-ferrara\/"},"uagb_featured_image_src":{"full":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/01\/security.jpg",1000,667,false],"thumbnail":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/01\/security-150x150.jpg",150,150,true],"medium":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/01\/security-300x200.jpg",300,200,true],"medium_large":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/01\/security-768x512.jpg",768,512,true],"large":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/01\/security.jpg",1000,667,false],"1536x1536":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/01\/security.jpg",1000,667,false],"2048x2048":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/01\/security.jpg",1000,667,false],"small-home-featured":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/01\/security.jpg",100,67,false],"sidebar-featured":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/01\/security-180x128.jpg",180,128,true],"genesis-singular-images":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/01\/security-896x504.jpg",896,504,true],"archive-featured":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/01\/security-400x225.jpg",400,225,true],"gb-block-post-grid-landscape":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/01\/security-600x400.jpg",600,400,true],"gb-block-post-grid-square":["https:\/\/www.codemotion.com\/magazine\/wp-content\/uploads\/2019\/01\/security-600x600.jpg",600,600,true]},"uagb_author_info":{"display_name":"Claudio Davide Ferrara","author_link":"https:\/\/www.codemotion.com\/magazine\/author\/claudio-davide-ferrara\/"},"uagb_comment_info":0,"uagb_excerpt":"The world is increasingly interconnected through the internet. More and more &#8220;smart&#8221; devices and appliances are now online 24 hours a day. But what are the real implications of the development of IoT and home automation? Are users really safe? What is the level of protection for their data? And what are the biggest risks&#8230;&hellip;","lang":"en","_links":{"self":[{"href":"https:\/\/www.codemotion.com\/magazine\/wp-json\/wp\/v2\/posts\/313","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.codemotion.com\/magazine\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.codemotion.com\/magazine\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.codemotion.com\/magazine\/wp-json\/wp\/v2\/users\/35"}],"replies":[{"embeddable":true,"href":"https:\/\/www.codemotion.com\/magazine\/wp-json\/wp\/v2\/comments?post=313"}],"version-history":[{"count":5,"href":"https:\/\/www.codemotion.com\/magazine\/wp-json\/wp\/v2\/posts\/313\/revisions"}],"predecessor-version":[{"id":16040,"href":"https:\/\/www.codemotion.com\/magazine\/wp-json\/wp\/v2\/posts\/313\/revisions\/16040"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.codemotion.com\/magazine\/wp-json\/wp\/v2\/media\/314"}],"wp:attachment":[{"href":"https:\/\/www.codemotion.com\/magazine\/wp-json\/wp\/v2\/media?parent=313"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.codemotion.com\/magazine\/wp-json\/wp\/v2\/categories?post=313"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.codemotion.com\/magazine\/wp-json\/wp\/v2\/tags?post=313"},{"taxonomy":"collections","embeddable":true,"href":"https:\/\/www.codemotion.com\/magazine\/wp-json\/wp\/v2\/collections?post=313"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}