[email protected] +44 20 8123 2220 (UK) +1 732 587 5005 (US) Contact Us | FAQ |

Trends in Smart Home Data Security and Privacy

October 2019 | 82 pages | ID: TD700A38A34CEN
Parks Associates

US$ 3,500.00

E-mail Delivery (PDF)

Download PDF Leaflet

Accepted cards
Wire Transfer
Checkout Later
Need Help? Ask a Question
Connectivity in the home and the addition of connected devices continue to expand year-over-year, with consumers now owning an average of more than eight connected CE products in their home. The increasing levels of connectivity in consumers’ lives provide easy targets for hackers and present security and privacy concerns for consumers. This report examines the challenges in securing the smart home and new opportunities for security solution providers. The report also assesses common and potential attacks in the connected landscape as new connected solutions, such as 5G technologies, are implemented. It profiles companies offering data security solutions for the connected home and product and service providers who are leading the way on securing the smart home.
RESEARCH OBJECTIVES

Research Approach
Companies Interviewed or Researched

EXECUTIVE SUMMARY

Industry Insight
Data Security & Privacy Trends - User Experiences
Data Security & Privacy Trends - Technologies
Data Security & Privacy Trends – Marketing & Sales Channels
Connected Home Data Security and Privacy Ecosystem
Key Findings and Recommendations

DEFINING DATA SECURITY AND PRIVACY

Data Security vs. Data Privacy
Trade-offs for Consumers
Classification of Data Security and Privacy Attacks
Targets and Objectives of Data Security/Privacy Attacks
Direct and Indirect Attacks
Privacy Vulnerabilities

CONSUMER INSIGHTS

Security/Privacy Concern and Problems (Q4/18)
Consumer Concerns on Security/Privacy Issues (Q4/18)
Actions Taken to Prevent Unauthorized Access to Devices (Q4/18)
Smart Home Devices: Purchase Inhibitors (Q4/18)
Appeal of Cybersecurity Services (Q4/18)
Appeal of Cybersecurity Services by Introduction Text (Q4/18)
Desirability of Cybersecurity Services (Q4/18)
Preferred Provider of Cybersecurity Services (Q4/18)

DATA BREACH INCIDENCES AND VULNERABILITIES

Status of Data Breaches in Connected Homes
The 2016 Mirai Attack by Exploiting Default Username/Password
The 2017 Fish Tank Attack Showed Much Bigger Lateral Damages
The 2019 Nest Cam Hacking due to Credit Stuffing Attacks
Supporting Consumers: An Academic Study on Privacy Vulnerabilities in Smart Home
Turning Data Attacks into Physical Attacks
Data Privacy/Security Ecosystem Opportunities for Action

REGULATORY ANALYSIS ON DATA SECURITY AND PRIVACY

Legislations on Smart Home Data Security and Privacy
Leading Legislation: The EU General Data Protection Regulation (GDPR)
GDPR: The Smart Home Manufacturers Respond
Data Protection Laws in the US
Passed and Pending US Regulations and Standards
Federal Standards: Defining Cybersecurity and Privacy Risks for Organizations
Federal Standards: IoT Device Manufacturers
Pending Federal Legislation: IoT Device Manufacturers Selling to Government
State Legislation: California SB-327 Information Privacy: Connected Devices 2018
State Legislation: CCPA Affects Businesses Using Consumer Data
CCPA vs. GDPR - Summary
CCPA vs. GDPR - Details
Cybersecurity Impacts: Brand Perception and Fines

BUSINESS MODELS AND SERVICES

Business Models in Smart Home Data Security and Privacy
Interest in Security/Privacy Services (Q4/18)
A Taxonomy of Cybersecurity Solutions
B2C Business Model by Smart Home Service Provider
B2C Business Model by Broadband Service Provider
B2B Business Models
B2C and B2B Example: F-Secure
Business Models: B2B + B2B2C
CUJO AI Security Profile
CUJO AI: Unique Advantages
The Public/Private Partnership Model

TECHNOLOGY OPPORTUNITIES

Technologies to Protect Data Security and Privacy in Smart Home
Tradeoff between Security and Convenience: TFA and MFA
Privacy Enhancing Technologies (PET)
Typical Privacy Enhancing Technologies
AI and ML Become Essential for Cybersecurity
Where and How to Apply AI/ML in Cybersecurity
Example: Cybersecurity AI Platform
Privacy by Design (PbD)
Impact of 5G to Smart Home Data Security and Privacy

APPENDIX

Glossary of Security Threats
Definition of Adversary/Threat Model
Capability Levels of Adversary & Threat Models


More Publications