Download Table of Contents (PDF)
Research Objectives
Research Approach
Companies Interviewed or Researched
Executive Summary
Industry Insight
Data Security & Privacy Trends - User Experiences
Data Security & Privacy Trends - Technologies
Data Security & Privacy Trends – Marketing & Sales Channels
Connected Home Data Security and Privacy Ecosystem
Key Findings and Recommendations
Defining Data Security and Privacy
Data Security vs. Data Privacy
Trade-offs for Consumers
Classification of Data Security and Privacy Attacks
Targets and Objectives of Data Security/Privacy Attacks
Direct and Indirect Attacks
Privacy Vulnerabilities
Consumer Insights
Security/Privacy Concern and Problems
Consumer Concerns on Security/Privacy Issues
Actions Taken to Prevent Unauthorized Access to Devices
Smart Home Devices: Purchase Inhibitors
Appeal of Cybersecurity Services
Appeal of Cybersecurity Services by Introduction Text
Desirability of Cybersecurity Services
Preferred Provider of Cybersecurity Services
Data Breach Incidences and Vulnerabilities
Status of Data Breaches in Connected Homes
The 2016 Mirai Attack by Exploiting Default Username/Password
The 2017 Fish Tank Attack Showed Much Bigger Lateral Damages
The 2019 Nest Cam Hacking due to Credit Stuffing Attacks
Supporting Consumers: An Academic Study on Privacy Vulnerabilities in Smart Home
Turning Data Attacks into Physical Attacks
Data Privacy/Security Ecosystem Opportunities for Action
Regulatory Analysis on Data Security and Privacy
Legislations on Smart Home Data Security and Privacy
Leading Legislation: The EU General Data Protection Regulation (GDPR)
GDPR: The Smart Home Manufacturers Respond
Data Protection Laws in the US
Passed and Pending US Regulations and Standards
Federal Standards: Defining Cybersecurity and Privacy Risks for Organizations
Federal Standards: IoT Device Manufacturers
Pending Federal Legislation: IoT Device Manufacturers Selling to Government
State Legislation: California SB-327 Information Privacy: Connected Devices 2018
State Legislation: CCPA Affects Businesses Using Consumer Data
CCPA vs. GDPR - Summary
CCPA vs. GDPR - Details
Cybersecurity Impacts: Brand Perception and Fines
Business Models and Services
Business Models in Smart Home Data Security and Privacy
Interest in Security/Privacy Services
A Taxonomy of Cybersecurity Solutions
B2C Business Model by Smart Home Service Provider
B2C Business Model by Broadband Service Provider
B2B Business Models
B2C and B2B Example: F-Secure
Business Models: B2B + B2B2C
CUJO AI Security Profile
CUJO AI: Unique Advantages
The Public/Private Partnership Model
Technology Opportunities
Technologies to Protect Data Security and Privacy in Smart Home
Tradeoff between Security and Convenience: TFA and MFA
Privacy Enhancing Technologies (PET)
Typical Privacy Enhancing Technologies
AI and ML Become Essential for Cybersecurity
Where and How to Apply AI/ML in Cybersecurity
Example: Cybersecurity AI Platform
Privacy by Design (PbD)
Impact of 5G to Smart Home Data Security and Privacy
Appendix
Glossary of Security Threats
Definition of Adversary/Threat Model
Capability Levels of Adversary & Threat Models
Research Objectives
Research Approach
Companies Interviewed or Researched
Executive Summary
Industry Insight
Data Security & Privacy Trends - User Experiences
Data Security & Privacy Trends - Technologies
Data Security & Privacy Trends – Marketing & Sales Channels
Connected Home Data Security and Privacy Ecosystem
Key Findings and Recommendations
Defining Data Security and Privacy
Data Security vs. Data Privacy
Trade-offs for Consumers
Classification of Data Security and Privacy Attacks
Targets and Objectives of Data Security/Privacy Attacks
Direct and Indirect Attacks
Privacy Vulnerabilities
Consumer Insights
Security/Privacy Concern and Problems
Consumer Concerns on Security/Privacy Issues
Actions Taken to Prevent Unauthorized Access to Devices
Smart Home Devices: Purchase Inhibitors
Appeal of Cybersecurity Services
Appeal of Cybersecurity Services by Introduction Text
Desirability of Cybersecurity Services
Preferred Provider of Cybersecurity Services
Data Breach Incidences and Vulnerabilities
Status of Data Breaches in Connected Homes
The 2016 Mirai Attack by Exploiting Default Username/Password
The 2017 Fish Tank Attack Showed Much Bigger Lateral Damages
The 2019 Nest Cam Hacking due to Credit Stuffing Attacks
Supporting Consumers: An Academic Study on Privacy Vulnerabilities in Smart Home
Turning Data Attacks into Physical Attacks
Data Privacy/Security Ecosystem Opportunities for Action
Regulatory Analysis on Data Security and Privacy
Legislations on Smart Home Data Security and Privacy
Leading Legislation: The EU General Data Protection Regulation (GDPR)
GDPR: The Smart Home Manufacturers Respond
Data Protection Laws in the US
Passed and Pending US Regulations and Standards
Federal Standards: Defining Cybersecurity and Privacy Risks for Organizations
Federal Standards: IoT Device Manufacturers
Pending Federal Legislation: IoT Device Manufacturers Selling to Government
State Legislation: California SB-327 Information Privacy: Connected Devices 2018
State Legislation: CCPA Affects Businesses Using Consumer Data
CCPA vs. GDPR - Summary
CCPA vs. GDPR - Details
Cybersecurity Impacts: Brand Perception and Fines
Business Models and Services
Business Models in Smart Home Data Security and Privacy
Interest in Security/Privacy Services (Q4/18)
A Taxonomy of Cybersecurity Solutions
B2C Business Model by Smart Home Service Provider
B2C Business Model by Broadband Service Provider
B2B Business Models
B2C and B2B Example: F-Secure
Business Models: B2B + B2B2C
CUJO AI Security Profile
CUJO AI: Unique Advantages
The Public/Private Partnership Model
Technology Opportunities
Technologies to Protect Data Security and Privacy in Smart Home
Tradeoff between Security and Convenience: TFA and MFA
Privacy Enhancing Technologies (PET)
Typical Privacy Enhancing Technologies
AI and ML Become Essential for Cybersecurity
Where and How to Apply AI/ML in Cybersecurity
Example: Cybersecurity AI Platform
Privacy by Design (PbD)
Impact of 5G to Smart Home Data Security and Privacy
Appendix
Glossary of Security Threats
Definition of Adversary/Threat Model
Capability Levels of Adversary & Threat Models