1. Home
  2. Tech
  3. News
  4. New GSMA guidelines address cybercrime for mobile lifestyle

New GSMA guidelines address cybercrime for mobile lifestyle

New GSMA guidelines address cybercrime for mobile lifestyle
0

The GSM Association (GSMA), the body representing the interest of mobile operators worldwide, says it has released new guidelines addressing the incessant cyber crimes and activities globally.

GSMA says the document is designed to tackle common cyber-security threats, as well as data privacy issues associated with  Internet of things (IoT) services.

‘The GSMA IoT Security Guidelines’ has been developed in consultation with the mobile industry and offers IoT service providers and the wider IoT ecosystem with useful tips on the development and deployment of secured  services in the Internet of Things (IoT) market.

The Internet of Things (IoT) is the network of physical objects devices, vehicles, buildings and other items which are embedded with electronics, software, sensors, and network connectivity, which enables these objects to collect and exchange data.

The project has received the backing and support of the mobile industry including  AT&T, China Telecom, Etisalat, KDDI, NTT DOCOMO, Orange, Telefónica, Telenor and Verizon and vendor and infrastructure partners 7Layers, Ericsson, Gemalto, Morpho, Telit and u-blox, GSMA says.

“As billions of devices become connected in the Internet of Things, offering innovative and interconnected new services, the possibility of potential vulnerabilities increases,” Alex Sinclair, Chief Technology Officer, GSMA, adds.

“These can be overcome if the end-to-end security of an IoT service is carefully considered by the service provider when designing their service and an appropriate mitigating technology is deployed. A proven and robust approach to security will create trusted, reliable services that scale as the market grows.”

The GSMA’s IoT Security Guidelines have been designed for all players in the IoT ecosystem including IoT service providers, IoT device manufacturers and developers.

Different phone brands on display at Ikeja Computer Village in Lagos
Different phone brands on display at Ikeja Computer Village in Lagos

They will help service providers build secure services by outlining technologies and methods to address potential threats, as well as how to implement them.

They also establish the need for risk assessment of all components of an IoT service to ensure they are designed to securely collect, store and exchange data and successfully mitigate cyber-security attacks.

Don A. Bailey, Founder and CEO, Lab Mouse Security says that, “there is a significant amount of evidence to suggest that cyber-attacks are already happening in the burgeoning IoT space. If not handled appropriately, these attacks are likely to inhibit the growth and stability of the Internet of Things.”

“It is imperative that the industry adopts a standard approach for dealing with security risks and mitigations, helping to ensure that the entire IoT ecosystem will not be subject to fraud, exposures of privacy, or attacks that affect human life.”

There's joy in sharing
Kayode Oladeinde Technology Journalist at Technology Times. Mobile: +234 (0) 7031526929

We want to hear from you...