Providing market intelligence for more than 35 years

Smart Home Devices, Automation, Controls

Q4 2019

Industry Report

Trends in Smart Home Data Security and Privacy

Connectivity in the home and the addition of connected devices continue to expand year-over-year, with consumers now owning an average of more than eight connected CE products in their home. The increasing levels of connectivity in consumers’ lives provide easy targets for hackers and present security and privacy concerns for consumers. This report examines the challenges in securing the smart home and new opportunities for security solution providers. The report also assesses common and potential attacks in the connected landscape as new connected solutions, such as 5G technologies, are implemented. It profiles companies offering data security solutions for the connected home and product and service providers who are leading the way on securing the smart home.

Purchase

Download Table of Contents (PDF)

Research Objectives

Research Approach

Companies Interviewed or Researched

Executive Summary

Industry Insight

Data Security & Privacy Trends - User Experiences

Data Security & Privacy Trends - Technologies

Data Security & Privacy Trends – Marketing & Sales Channels

Connected Home Data Security and Privacy Ecosystem

Key Findings and Recommendations

Defining Data Security and Privacy

Data Security vs. Data Privacy

Trade-offs for Consumers

Classification of Data Security and Privacy Attacks

Targets and Objectives of Data Security/Privacy Attacks

Direct and Indirect Attacks

Privacy Vulnerabilities

Consumer Insights

Security/Privacy Concern and Problems

Consumer Concerns on Security/Privacy Issues

Actions Taken to Prevent Unauthorized Access to Devices

Smart Home Devices: Purchase Inhibitors

Appeal of Cybersecurity Services

Appeal of Cybersecurity Services by Introduction Text

Desirability of Cybersecurity Services

Preferred Provider of Cybersecurity Services

Data Breach Incidences and Vulnerabilities

Status of Data Breaches in Connected Homes

The 2016 Mirai Attack by Exploiting Default Username/Password

The 2017 Fish Tank Attack Showed Much Bigger Lateral Damages

The 2019 Nest Cam Hacking due to Credit Stuffing Attacks

Supporting Consumers: An Academic Study on Privacy Vulnerabilities in Smart Home

Turning Data Attacks into Physical Attacks

Data Privacy/Security Ecosystem Opportunities for Action

Regulatory Analysis on Data Security and Privacy

Legislations on Smart Home Data Security and Privacy

Leading Legislation: The EU General Data Protection Regulation (GDPR)

GDPR: The Smart Home Manufacturers Respond

Data Protection Laws in the US

Passed and Pending US Regulations and Standards

Federal Standards: Defining Cybersecurity and Privacy Risks for Organizations

Federal Standards: IoT Device Manufacturers

Pending Federal Legislation: IoT Device Manufacturers Selling to Government

State Legislation: California SB-327 Information Privacy: Connected Devices 2018

State Legislation: CCPA Affects Businesses Using Consumer Data

CCPA vs. GDPR - Summary

CCPA vs. GDPR - Details

Cybersecurity Impacts: Brand Perception and Fines

Business Models and Services

Business Models in Smart Home Data Security and Privacy

Interest in Security/Privacy Services

A Taxonomy of Cybersecurity Solutions

B2C Business Model by Smart Home Service Provider

B2C Business Model by Broadband Service Provider

B2B Business Models

B2C and B2B Example: F-Secure

Business Models: B2B + B2B2C

CUJO AI Security Profile

CUJO AI: Unique Advantages

The Public/Private Partnership Model

Technology Opportunities

Technologies to Protect Data Security and Privacy in Smart Home

Tradeoff between Security and Convenience: TFA and MFA

Privacy Enhancing Technologies (PET)

Typical Privacy Enhancing Technologies

AI and ML Become Essential for Cybersecurity

Where and How to Apply AI/ML in Cybersecurity

Example: Cybersecurity AI Platform

Privacy by Design (PbD)

Impact of 5G to Smart Home Data Security and Privacy

Appendix

Glossary of Security Threats

Definition of Adversary/Threat Model

Capability Levels of Adversary & Threat Models

Research Objectives

Research Approach

Companies Interviewed or Researched

Executive Summary

Industry Insight

Data Security & Privacy Trends - User Experiences

Data Security & Privacy Trends - Technologies

Data Security & Privacy Trends – Marketing & Sales Channels

Connected Home Data Security and Privacy Ecosystem

Key Findings and Recommendations

Defining Data Security and Privacy

Data Security vs. Data Privacy

Trade-offs for Consumers

Classification of Data Security and Privacy Attacks

Targets and Objectives of Data Security/Privacy Attacks

Direct and Indirect Attacks

Privacy Vulnerabilities

Consumer Insights

Security/Privacy Concern and Problems

Consumer Concerns on Security/Privacy Issues

Actions Taken to Prevent Unauthorized Access to Devices

Smart Home Devices: Purchase Inhibitors

Appeal of Cybersecurity Services

Appeal of Cybersecurity Services by Introduction Text

Desirability of Cybersecurity Services

Preferred Provider of Cybersecurity Services

Data Breach Incidences and Vulnerabilities

Status of Data Breaches in Connected Homes

The 2016 Mirai Attack by Exploiting Default Username/Password

The 2017 Fish Tank Attack Showed Much Bigger Lateral Damages

The 2019 Nest Cam Hacking due to Credit Stuffing Attacks

Supporting Consumers: An Academic Study on Privacy Vulnerabilities in Smart Home

Turning Data Attacks into Physical Attacks

Data Privacy/Security Ecosystem Opportunities for Action

Regulatory Analysis on Data Security and Privacy

Legislations on Smart Home Data Security and Privacy

Leading Legislation: The EU General Data Protection Regulation (GDPR)

GDPR: The Smart Home Manufacturers Respond

Data Protection Laws in the US

Passed and Pending US Regulations and Standards

Federal Standards: Defining Cybersecurity and Privacy Risks for Organizations

Federal Standards: IoT Device Manufacturers

Pending Federal Legislation: IoT Device Manufacturers Selling to Government

State Legislation: California SB-327 Information Privacy: Connected Devices 2018

State Legislation: CCPA Affects Businesses Using Consumer Data

CCPA vs. GDPR - Summary

CCPA vs. GDPR - Details

Cybersecurity Impacts: Brand Perception and Fines

Business Models and Services

Business Models in Smart Home Data Security and Privacy

Interest in Security/Privacy Services (Q4/18)

A Taxonomy of Cybersecurity Solutions

B2C Business Model by Smart Home Service Provider

B2C Business Model by Broadband Service Provider

B2B Business Models

B2C and B2B Example: F-Secure

Business Models: B2B + B2B2C

CUJO AI Security Profile

CUJO AI: Unique Advantages

The Public/Private Partnership Model

Technology Opportunities

Technologies to Protect Data Security and Privacy in Smart Home

Tradeoff between Security and Convenience: TFA and MFA

Privacy Enhancing Technologies (PET)

Typical Privacy Enhancing Technologies

AI and ML Become Essential for Cybersecurity

Where and How to Apply AI/ML in Cybersecurity

Example: Cybersecurity AI Platform

Privacy by Design (PbD)

Impact of 5G to Smart Home Data Security and Privacy

Appendix

Glossary of Security Threats

Definition of Adversary/Threat Model

Capability Levels of Adversary & Threat Models

© November 2019 Parks Associates
All rights reserved.  No part of this book may be reproduced, in any form or by any means, without permission in writing from the publisher.

Printed in the United States of America. 

Disclaimer
Parks Associates has made every reasonable effort to ensure that all information in this report is correct.  We assume no responsibility for any inadvertent errors.

Newsletter

The Parks Points Newsletter Features All Aspects Of Our Research, Including Smart Home, Iot Devices, Entertainment And Digital Media, Security, Energy, Health, And Consumer Data.