{"id":1056,"date":"2016-07-24T22:35:23","date_gmt":"2016-07-24T20:35:23","guid":{"rendered":"https:\/\/blog.mi.hdm-stuttgart.de\/?p=1056"},"modified":"2023-08-06T21:54:46","modified_gmt":"2023-08-06T19:54:46","slug":"bring-your-own-device-advisible-but-often-still-harmful","status":"publish","type":"post","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2016\/07\/24\/bring-your-own-device-advisible-but-often-still-harmful\/","title":{"rendered":"Bring your own Device \u2013 advisible, but often still harmful"},"content":{"rendered":"<p><a href=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2016\/07\/byod.jpg\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"1057\" data-permalink=\"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2016\/07\/24\/bring-your-own-device-advisible-but-often-still-harmful\/byod\/\" data-orig-file=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2016\/07\/byod.jpg\" data-orig-size=\"500,350\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"byod\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2016\/07\/byod.jpg\" class=\"wp-image-1057 aligncenter\" src=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2016\/07\/byod-300x210.jpg\" alt=\"byod\" width=\"452\" height=\"316\" srcset=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2016\/07\/byod-300x210.jpg 300w, https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2016\/07\/byod.jpg 500w\" sizes=\"auto, (max-width: 452px) 100vw, 452px\" \/><\/a><\/p>\n<p style=\"text-align: center;\"><span style=\"font-weight: 400;\">(written by Mona Brunner, Maren Gr\u00e4ff and Verena Hofmann)<\/span><\/p>\n<p><b>Introduction<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Bring your own device (BYOD) is a concept which enables employees to use their personal devices for work. The most poplular devices are smartphones and tablets, however, notebooks can also be included as well. Using their own device employees can access their work Emails, calendar as well as other company data on their own devices. <\/span><br \/>\n<!--more--><br \/>\n<b>Benefits <\/b><\/p>\n<p><span style=\"font-weight: 400;\">With BYOD employees can choose the device they want to work on themselves and do not need to pick from a mostly limited choice of hardware a company offers. This can increase the overall job satisfaction. Additionally, &nbsp;productivity improves significantly since people have their smartphones with them most of the time and are therefore likely to work in their free time as well. This is because they will immediately see when new Emails or calls come in. From a company perspective this has a great financial benefit as well since the employees are paying for the devices themselves.<\/span><\/p>\n<p><b>Risks and Threats<\/b><\/p>\n<p><span style=\"font-weight: 400;\">While there are numerous benefits to BYOD there are also risks to consider. According to a survey conducted by Risikomanagement-Netzwerks RiskNet 46 per cent of the polled companies stated they see their own employees as the main risk. This is because they might download unauthorized<\/span><span style=\"font-weight: 400;\"> applications, visit unsecure websites or leave<\/span><span style=\"font-weight: 400;\"> devices unattended.<\/span><span style=\"font-weight: 400;\"> Furthermore, the survey \u201eIT-Sicherheit und Datenschutz 2014\u201c by NIFIS found that more than 29 per cent of German companies lost business critical data after allowing BYOD. Data privacy is another important aspect to consider. A company has to ensure that there is sufficient<\/span><span style=\"font-weight: 400;\"> protection from theft, loss or cyber attacks. If they do not manage this they risk a contravension against Article 30 of the EU Data Protection Law. Moreover, BYOD can cause violation of copyrights. &nbsp;Many software programs must not be used for commercial purposes but only for private. In order to be compliant here the employer needs to arrange a software license to be able to legally exert the software for business purposes on the employee\u2019s device. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">The biggest threat that companies face is theft or loss of these devices. Moreover, connecting the device to open wireless networks possibly enables potential attackers to spy on their activity. Malware is also a significant threat that can cause a lot of harm to a business. Special malware can potentially log, steal and even publish almost everything an employee does on a mobile device. Additionally, companies have to watch out for other threats such as phishing attacks, insecure cloud-based storage services or other applications.<\/span><\/p>\n<p><strong>Solution approaches<\/strong><\/p>\n<p><span style=\"font-weight: 400;\">On the bright side there are also different approaches for solutions to ensure right usage of BYOD and for reducing risks and threats to a company. For example, the BYOD-Policy is one solution to manage the use of BYOD. It consists of the following four points:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Authority rules: Who in the company has the authority for BYOD?<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Privacy protection rules: How will the privacy of the employees be secured?<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Financing rules: What does the financing program look like?<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Operating rules: How can employees use their private devices in the company as well as in their daily life?<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Furthermore, there exist several security features for devices. For example the authority concept. Here all applications have to be authorized in advance for access to main functions of the operating systems. In addition applications offer different options and are unable to gain access to data of other apps or change important system files. Users can also encrypt a whole file system. Another highly important and simple security function is access protection. Access protection prevents unauthorized access to a device. There are different mechanisms<\/span><span style=\"font-weight: 400;\"> for authorization, for example PIN, passwords or fingerprint scanners.<\/span><\/p>\n<p>We defined guidelines for the company, its employees and the infrastructure on how the usage of BYOD can be managed.<\/p>\n<p><b>Guideline for the company<\/b><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Define the aim of BYOD<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Evaluate the risks for the company<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Create transparency by defined rules<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Create technical and organizational conditions<\/span><\/li>\n<\/ul>\n<p><b>Guideline for the employees<\/b><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Take on responsibility to ensure correct usage of the devices<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Provide for security for example by spam, malware and virus detection<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Accept agreements<\/span><\/li>\n<\/ul>\n<p><b>Guideline for the infrastructure<\/b><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">The private devices have to be integrated in the security concept and security standards<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">A device and place independent access, data security and data detection have to be provided<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Define rules for the extent and security of the usage concerning all apps and services<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">These guidelines will help companies realize the BYOD approach for their employees and reduce the risks and threats of BYOD.<\/span><\/p>\n<p><b>Conclusion<\/b><\/p>\n<p><span style=\"font-weight: 400;\">In Germany the BYOD approach is currently a big trend for companies. However, in America there is a decreased tendancy towards BYOD because of alternatives to this approach. For example Leave Your Own Device (LYOD) or Choose Your Own Device (CYOD). With LYOD the employee receives a company device which he can also use privately. Alternatively, with CYOD the employee can choose a device from a list of in-house devices. However, there is still no perfect solution handling security problems in using BYOD availablefor, therefore, it is highly unlikely that every company will offer the BYOD concept to their employees in the near future.<\/span><\/p>\n<p><b>Research questions<\/b><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">If the employee gets suspended, what about the data and the devices? On private devices private as well as business data is stored. If an employee gets suspended the IT department has to choose an approach which ensures that only business data will be deleted. In most cases the device has to have two partitions, but an employee can potentially also save business data on the private partition.<\/span><\/li>\n<\/ul>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Who bears responsibility and who is liable in cases of loss, theft or a security attack? It is extremly important to define responsibility in case of a security attack. Would it be the company because of insufficient control or the employee because of insufficient security protection?<\/span><\/li>\n<\/ul>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">If a company completely adopts BYOD will the employees be constrained to use their private devices in the business?<\/span><\/li>\n<\/ul>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Can a complete separation of private data and business data be guaranteed?<\/span><\/li>\n<\/ul>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">In cases of loss or theft, who is responsible to erase the data? And will the whole data (including the private data) be deleted or only the business data?<\/span><\/li>\n<\/ul>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Is it even possible to develop a secure BYOD concept for the company and its employees? Microsoft has already developed and implemented a <\/span><a href=\"https:\/\/www.microsoft.com\/itshowcase\/Article\/Content\/588\/Mobile-device-management-at-Microsoft\"><span style=\"font-weight: 400;\">BYOD concept<\/span><\/a><span style=\"font-weight: 400;\"> &#8211; Could this be the ideal approach also for other companies?<\/span><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><b>Sources<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Bundesamt f\u00fcr Sicherheit und Informationstechnik (2013): \u201e\u00dcberblickspapier Consumerisation und BYOD\u201c, Internet:<\/span><a href=\"https:\/\/www.bsi-fuer-buerger.de\/SharedDocs\/Downloads\/DE\/BSI\/Grundschutz\/Download\/Ueberblickspapier_BYOD_pdf.pdf?__blob=publicationFile\"><span style=\"font-weight: 400;\"> https:\/\/www.bsi-fuer-buerger.de\/SharedDocs\/Downloads\/DE\/BSI\/Grundschutz\/Download\/Ueberblickspapier_BYOD_pdf.pdf?__blob=publicationFile<\/span><\/a><span style=\"font-weight: 400;\">, Zugriff am 20.05.2016.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Trendlaps (2012): \u201eBRING YOUR OWN DEVICE: TREND ODER BEDROHUNG\u201c , Internet:<\/span><a href=\"http:\/\/www.trendmicro.de\/media\/misc\/byod-five-mobile-threats-to-smb-de.pdf\"><span style=\"font-weight: 400;\"> http:\/\/www.trendmicro.de\/media\/misc\/byod-five-mobile-threats-to-smb-de.pdf<\/span><\/a><span style=\"font-weight: 400;\">, Zugriff am 20.05.2016.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">E-Commerce Magazine (2012): \u201eBYOD: Rechtliche Konsequenzen f\u00fcr Arbeitnehmer\u201c, Internet:<\/span><a href=\"http:\/\/www.e-commerce-magazin.de\/byod-rechtliche-konsequenzen-fuer-arbeitnehmer\"><span style=\"font-weight: 400;\"> http:\/\/www.e-commerce-magazin.de\/byod-rechtliche-konsequenzen-fuer-arbeitnehmer<\/span><\/a><\/p>\n<p><span style=\"font-weight: 400;\">Kohne, A.; Ringleb, S.; Y\u00fccel, C. (2015): Bring your own Device \u2013 Einsatz von privaten Endger\u00e4ten im beruflichen Umfeld \u2013 Chancen, Risiken und M\u00f6glichkeiten, Wiesbaden: Springer Fachmedien<\/span><\/p>\n<p><span style=\"font-weight: 400;\">BITKOM (2013): Bring your own Device, Internet:<\/span><a href=\"https:\/\/www.bitkom.org\/Publikationen\/2013\/Leitfaden\/BYOD\/130304-LF-BYOD.pdf\"><span style=\"font-weight: 400;\"> https:\/\/www.bitkom.org\/Publikationen\/2013\/Leitfaden\/BYOD\/130304-LF-BYOD.pdf<\/span><\/a><\/p>\n<p><span style=\"font-weight: 400;\">Deutschland sicher im Netz e.V. (o. J.): Bring your own Device \u2013 Regeln f\u00fcr KMU und Nutzer, Internet:<\/span><a href=\"https:\/\/www.sicher-im-netz.de\/sites\/default\/files\/download\/dsin_byod_20130227_web.pdf\"><span style=\"font-weight: 400;\"> https:\/\/www.sicher-im-netz.de\/sites\/default\/files\/download\/dsin_byod_20130227_web.pdf<\/span><\/a><\/p>\n<p><span style=\"font-weight: 400;\">RingCentral (2014): Bring your own device trends and benefits, Internet:<\/span><\/p>\n<p><a href=\"https:\/\/www.youtube.com\/watch?v=KglVvRz8d4Y\"><span style=\"font-weight: 400;\">https:\/\/www.youtube.com\/watch?v=KglVvRz8d4Y<\/span><\/a><\/p>\n<p><span style=\"font-weight: 400;\">Microsoft (2016): Mobile device management at Microsoft, Internet:<\/span><a href=\"https:\/\/www.microsoft.com\/itshowcase\/Article\/Content\/588\/Mobile-device-management-at-Microsoft\"><span style=\"font-weight: 400;\"> https:\/\/www.microsoft.com\/itshowcase\/Article\/Content\/588\/Mobile-device-management-at-Microsoft<\/span><\/a><\/p>\n<p><span style=\"font-weight: 400;\">Bildquelle: <\/span><a href=\"http:\/\/www.maximizer.com\/blog\/data-security-in-a-bring-your-own-device-workplace\/\"><span style=\"font-weight: 400;\">http:\/\/www.maximizer.com\/blog\/data-security-in-a-bring-your-own-device-workplace\/<\/span><\/a><\/p>\n<p><span style=\"font-weight: 400;\">Survey Risikomanagement-Netzwerks RiskNet: <\/span><a href=\"http:\/\/www.computerwoche.de\/i\/detail\/artikel\/2510205\/1\/1855333\/EL_13349325277423724783271\/\"><span style=\"font-weight: 400;\">http:\/\/www.computerwoche.de\/i\/detail\/artikel\/2510205\/1\/1855333\/EL_13349325277423724783271\/<\/span><\/a><\/p>\n<p><span style=\"font-weight: 400;\">Survey Nifis:<\/span><\/p>\n<p><a href=\"http:\/\/www.nifis.de\/veroeffentlichungen\/news\/datum\/2014\/08\/19\/studie-byod-hohes-risiko-beim-datenschutz\/\"><span style=\"font-weight: 400;\">http:\/\/www.nifis.de\/veroeffentlichungen\/news\/datum\/2014\/08\/19\/studie-byod-hohes-risiko-beim-datenschutz\/<\/span><\/a><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>(written by Mona Brunner, Maren Gr\u00e4ff and Verena Hofmann) Introduction Bring your own device (BYOD) is a concept which enables employees to use their personal devices for work. The most poplular devices are smartphones and tablets, however, notebooks can also be included as well. Using their own device employees can access their work Emails, calendar [&hellip;]<\/p>\n","protected":false},"author":47,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1,26,651],"tags":[],"ppma_author":[706],"class_list":["post-1056","post","type-post","status-publish","format-standard","hentry","category-allgemein","category-secure-systems","category-system-designs"],"aioseo_notices":[],"jetpack_featured_media_url":"","jetpack-related-posts":[{"id":1568,"url":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2016\/09\/08\/secure-systems-2016-an-overview-walter-kriha\/","url_meta":{"origin":1056,"position":0},"title":"Secure Systems 2016 &#8211; An Overview, Walter Kriha","author":"Walter Kriha","date":"8. September 2016","format":false,"excerpt":"This is an attempt to provide an overview of the topics in \"Secure Systems\", a seminar held during the summer term 2016 at the Stuttgart Media University HdM. Presentations have been given and blog entries into our new MI blog were made. With the chosen topics we have been quite\u2026","rel":"","context":"In &quot;Allgemein&quot;","block_context":{"text":"Allgemein","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/category\/allgemein\/"},"img":{"alt_text":"securesystems","src":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2016\/09\/securesystems-205x300.png?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":20290,"url":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2021\/08\/02\/zero-trust-security-the-further-development-of-perimeter-security\/","url_meta":{"origin":1056,"position":1},"title":"Zero Trust Security &#8211; The further development of perimeter security?","author":"Max Merz","date":"2. August 2021","format":false,"excerpt":"Most companies use perimeter security to secure their cooperate applications, services and data from attackers and unauthorised users. This approach includes a cooperate network, where clients, that are part of the network are able to access the applications. This includes attackers that got access to these networks.Additionally more applications are\u2026","rel":"","context":"In &quot;Allgemein&quot;","block_context":{"text":"Allgemein","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/category\/allgemein\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2021\/08\/Windows_365.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2021\/08\/Windows_365.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2021\/08\/Windows_365.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2021\/08\/Windows_365.png?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":11186,"url":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2020\/09\/14\/the-development-of-the-intranet-into-beyondcorp\/","url_meta":{"origin":1056,"position":2},"title":"The development of the intranet into BeyondCorp","author":"Aron K\u00f6cher","date":"14. September 2020","format":false,"excerpt":"Aron K\u00f6cher, Miro Bilge Only a few years earlier, the solution to exchange digital information like documents or pictures was to establish a physical connection between the participants. A usb stick was passed around the class to exchange music, you went to your friends house to print some urgent papers\u2026","rel":"","context":"In &quot;Secure Systems&quot;","block_context":{"text":"Secure Systems","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/category\/system-designs\/secure-systems\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2020\/09\/Bildschirmfoto-2020-09-14-um-17.06.48.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2020\/09\/Bildschirmfoto-2020-09-14-um-17.06.48.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2020\/09\/Bildschirmfoto-2020-09-14-um-17.06.48.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2020\/09\/Bildschirmfoto-2020-09-14-um-17.06.48.png?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2020\/09\/Bildschirmfoto-2020-09-14-um-17.06.48.png?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2020\/09\/Bildschirmfoto-2020-09-14-um-17.06.48.png?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":3910,"url":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2018\/08\/14\/beyond-corp-a-new-approach-to-enterprise-security\/","url_meta":{"origin":1056,"position":3},"title":"Beyond Corp &#8211; Google&#8217;s approach to enterprise security","author":"Domenik Jockers","date":"14. August 2018","format":false,"excerpt":"What is Beyond Corp? Beyond corp is a concept which was developed and is used by Google and is by now adopted by some other companies. The idea behind it was to get away from the intranet and its perimeter defense, where, if you breach the perimeter you can access\u2026","rel":"","context":"In &quot;Secure Systems&quot;","block_context":{"text":"Secure Systems","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/category\/system-designs\/secure-systems\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2018\/08\/pipeline.png?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":10555,"url":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2020\/08\/19\/iot-security-the-current-situation-best-practices-and-how-these-should-be-applied\/","url_meta":{"origin":1056,"position":4},"title":"IoT security \u2013 The current situation, \u201cbest practices\u201d and how these should be applied","author":"lh133","date":"19. August 2020","format":false,"excerpt":"Smart thermostats, lamps, sockets, and many other devices are no longer part of any futuristic movies. These items can be found in most households, at least in parts, whether in Europe, America, or Asia. A trend that affects the entire globe and is currently gaining ground, especially in industrialized countries.\u2026","rel":"","context":"In &quot;Internet of Things&quot;","block_context":{"text":"Internet of Things","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/category\/scalable-systems\/internet-of-things\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2020\/08\/PaperClasses.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2020\/08\/PaperClasses.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2020\/08\/PaperClasses.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2020\/08\/PaperClasses.png?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":3217,"url":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2017\/09\/14\/embedded-security-using-an-esp32\/","url_meta":{"origin":1056,"position":5},"title":"Embedded Security using an ESP32","author":"benjaminmorgner","date":"14. September 2017","format":false,"excerpt":"Ever wondered why your brand-new Philips Hue suddenly starts blinking SOS? Or why there is an ominous Broadcast on your Samsung TV while watching your daily Desperate Housewives? And didn't you wear an Apple Watch a few minutes ago, and why did you buy 2 TVs in that time? Security\u2026","rel":"","context":"In &quot;Secure Systems&quot;","block_context":{"text":"Secure Systems","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/category\/system-designs\/secure-systems\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"jetpack_sharing_enabled":true,"authors":[{"term_id":706,"user_id":47,"is_guest":0,"slug":"mg160","display_name":"Maren Gr\u00e4ff","avatar_url":"https:\/\/secure.gravatar.com\/avatar\/dd5917b1517e13ca3bf2e67659b5d4417a9387b39c1a6b1a45ae9d2cbe83eae2?s=96&d=mm&r=g","0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/posts\/1056","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/users\/47"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/comments?post=1056"}],"version-history":[{"count":6,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/posts\/1056\/revisions"}],"predecessor-version":[{"id":24689,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/posts\/1056\/revisions\/24689"}],"wp:attachment":[{"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/media?parent=1056"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/categories?post=1056"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/tags?post=1056"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/ppma_author?post=1056"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}