Please start preparing the your final project for presentation at residency. The final project consists of three parts: Topic: IoT Threats to Database Security 1. a twelve minute powerpoint presentati

Please start preparing the your final project for presentation at residency. The final project consists of three parts:

Topic: IoT Threats to Database Security

1. a twelve minute powerpoint presentation with at least 12 slides not including a reference list. If you use images, you must provide proper attribution. Be focused and provide something your peers will find useful not what we could find on a Wikipedia page.

2. An annotated reference list of at least five references. Annotations are notes. In this case write two paragraphs about each source. The first is a summary of what the source informs and the second is why it is valuable.

3. A one page single spaced summary of what you learned in this project. it should be written in essay format with no bullet or numbered lists. It must include quotes from your sources which must be surrounded by quotation marks and cited in-line. It must have an informative title which should not be too broad but should focus attention on your topic.


This is the proposal that we made for final project.

IoT Threats to Database Security

I choose "IoT Threats to Database Security" topic as my final project.  The interconnection that exists between physical devices and objects in the world has been brought about by the Internet of things concept. However, despite the numerous benefits that have come with the incorporation of the IoT in the running of activities within organizations there are also threats that have also come with these Internet connections that have to be taken care of. Therefore, the main reason behind selection of this topic is the consideration of the security threats that IoT causes to the database of any organization.

Organizational data is crucial for the success of any company. (Chin, Li & Chen, 2017),  "Critical decision making processes require the use of data to make precise decisions effective in solving issues that the organization might be facing". As such, it’s important that databases are secure to avoid leakage of such important information stored by the organization.  Internet of things is a threat to such data due to the insecurity that might a raise between the web interfaces.  Therefore, the management should be able to analyze the security of its interfaces so that insecurity issues arising from the interconnection of the Internet do not pose a threat to the use of the organizational databases.

Besides that, Internet of things poses threats to the database` security whenever there are insufficient authentication and authorization process. Internet has become accessible to most parts of the world. Most of the people use Internet to execute their activities. However, there are those that use Internet connections to execute their malicious activities. In this case, organizations become vulnerable whenever the authorization and authentication process is not secured which might lead to easy accessibility by unwanted people. Ma et al. (2018) stated that "organizations face insecurity challenges when authorization and authentication process are easily bypassed by unwanted persons". Therefore, secure measures have to be put in place to avoid easy accessibility by unauthorized individuals.

In addition, IoT poses threats to database security through insecure cloud interface. Lu & Da, (2018) states that "any organization that deals with software faces threats and is highly insecure if they contain highly sensitive data within their databases'. In today`s world data has become highly sensitive in execution of daily duties especially with the availability of big data analytics tools but this has not kept away the intruders from taking their malicious plans. Therefore, it’s important that there is effective management of such threats to avoid organizations facing serious threats that might lead to collapse of organizations dealing with such critical data.

In summary, the concept of Internet of things has really impacted the world positively. However, the challenges that have come with the use of the concept have meant that the management of these organizations must be able to put in place effective security management measures to avoid running at a loss.

                                                                                                   References

Chin, W. L., Li, W., & Chen, H. H. (2017). Energy big data security threats in IoT-based smart grid communications. IEEE Communications Magazine, 55(10), 70-75.

Ma, C., Kulshrestha, S., Shi, W., Okada, Y., & Bose, R. (2018, March). E-learning material development framework supporting VR/AR based on linked data for IoT security education. In International Conference on Emerging Internetworking, Data & Web Technologies (pp. 479-491). Springer, Cham.

Lu, Y., & Da Xu, L. (2018). Internet of Things (IoT) cybersecurity research: a review of current research topics. IEEE Internet of Things Journal, 6(2), 2103-2115.