Connected World

Req 7 — IoT Devices

7.
Connected Devices and Internet of Things (IoT). Describe to your counselor four electronic devices you encounter that could be connected to the internet, why this connectivity can be useful, what risks are posed by the connectivity, and how they could be protected.

Your refrigerator can order groceries. Your doorbell can send video to your phone. Your watch can track your heartbeat and upload it to the cloud. Welcome to the Internet of Things (IoT) — the network of everyday objects connected to the internet. It is incredibly useful and incredibly risky at the same time.

What Is the Internet of Things?

The IoT is the expanding universe of physical devices — beyond traditional computers and phones — that connect to the internet to send, receive, or process data. There are already more IoT devices on Earth than people, and the number is growing by billions each year.

These devices often have limited computing power, minimal security features, and rarely receive software updates after they are sold. This makes them prime targets for attackers — as you learned in Req 3a when discussing the Mirai botnet, which hijacked hundreds of thousands of IoT devices.

Four IoT Devices to Consider

Here are examples organized by where you might encounter them. Choose four that you actually see in your life — your counselor will be more interested in devices you can speak about from personal experience.

Smart Home Devices

Smart speakers and voice assistants (Amazon Echo, Google Home, Apple HomePod):

Smart thermostats and home automation (Nest, Ecobee):

Wearable Devices

Fitness trackers and smartwatches (Apple Watch, Fitbit, Garmin):

Security Devices

Smart cameras and doorbells (Ring, Nest Cam, Arlo):

Gaming and Entertainment

Gaming consoles (Xbox, PlayStation, Nintendo Switch):

Other IoT Devices to Consider

General IoT Protection Rules

No matter which four devices you discuss, these principles apply to all of them:

IoT Security Basics

Apply these to every connected device
  • Change default passwords: Factory-set passwords are publicly known. Change them immediately.
  • Keep firmware updated: Check for updates regularly — many IoT devices do not update automatically.
  • Use a separate network: Put IoT devices on a guest Wi-Fi network so a compromised device cannot reach your computers and phones.
  • Disable unused features: If you do not use voice control or remote access, turn it off. Every feature is a potential entry point.
  • Research before buying: Check whether the manufacturer provides regular security updates and for how long.
What Is the Internet of Things (IoT)? — IBM A comprehensive overview of IoT technology, applications, and security considerations from IBM.
Cutaway house showing IoT devices in different rooms connected by dotted lines to a central Wi-Fi router