de Dana Worley | Atualizada: 12/07/2016 | Comentários: 2
The Internet of Things offers a lot of advantages in today’s culture. There are consumer devices that let you monitor and control mood lighting and music in your home, keep track of last week’s leftover dinner in your refrigerator, and help you brew a cup of coffee while monitoring how many coffee beans you have left in the pantry. The list of Internet-connected devices that are designed to make our lives easier grows daily. However, as we have recently seen in the media, there is a downside to this widely distributed connectivity: Internet-connected devices that are not properly secured can pose a security risk.
Unlike consumer device manufacturers, at Campbell Scientific, data logger security and integrity of data have always been at the top of our minds when we develop instruments. In this article, I’ve provided a summary of the security measures available for our Internet-connected data loggers. I hope you can use this information to help secure your data logger, data, and network, while ensuring that you have the access you need to accomplish your data collection tasks.
Campbell Scientific's data acquisition systems are represented as two parts—the data logger hardware and the software used to manage the hardware. Security measures for these two components are addressed separately in this article; however, please keep in mind that a combination of these measures ensures the overall integrity and reliability of your data acquisition system.
Follow the tips in each of the three steps below:
You can use the LoggerNet Admin software program to communicate with and program your data logger, as well as to collect data. LoggerNet Admin includes a Security Manager, which you can use to set up five levels of user accounts. Each level grants varying degrees of access to functionality in the software (and thus, control of the data logger). Look for a future blog article that covers LoggerNet Admin Security in more detail.
Just like any other Internet-connected device, no data acquisition system is without its vulnerabilities. The risks associated with Campbell Scientific's systems, however, can be mitigated with proper measures. The key to securing your data logger, data, and network is to put the controls in place to ensure your data logger is secure, while still allowing the access you need to complete your data acquisition tasks.
If you have questions about security related to Campbell Scientific's hardware or software, leave a comment below, or contact your local Campbell Scientific office or representative.
Comentários
Vim | 12/08/2016 at 01:13 AM
This is a very interesting blog post. Another point to add, the advantages of including all the levels of security could be to reduce data throughput. If you are using cellular modems or even IP based satellite modems, costs can be expensive. If you have someone constantly sending requests (ping or just a brute force IP based attacks) to a public facing IP address for the datalogger then data costs can mount. Having these levels of security can reduce or deny some of these request/attacks.
Dana | 12/09/2016 at 09:20 AM
Hello Vim,
There are many ramifications of having an unsecure device on an accessible network, and costs are certainly a big one. Thank you for point this out. Best -- Dana
Please log in or register to comment.