Answered You can hire a professional tutor to get the answer.

QUESTION

Write a response In the literature reviews findings I found that within the peer review, “Analysis & Prevention Of Possible Threats For Internet Connected Devices In The Urban Jungle Of Internet Of

Write a response 

In the literature reviews findings I found that within the peer review, “Analysis & Prevention Of Possible Threats For Internet Connected Devices In The Urban Jungle Of Internet Of Things” that security was not soundly produced in IoT.  IoT was built to help organizations manage cost of efficiencies, novel uses, and altered encounters that are alluring to the two makers and customers (Kumar, T. 2018).   In the article, it talks about how the prioritization of IoT security is paramount and must be addressed, as it is currently not being properly handled or thought about in the current design of IoT devices.  IoT devices could easily be compromised and when conducting its routine it could be sending that data from the device to a server but if that device is compromised it could be relaying the data to a malicious actors computer and not the trusted server.  Some of the proposed methods to strengthen security in IoT devices is to use the Ping/Pulse message approach have a shared secret key that is different for each device or group of devices and have it send a ping out to the server and a pulse back to the device if the shared key (secret) match.  This will enhance the security measures for IoT devices that have been compromised.  The other measure that can be used is to build a tamper proof physical casing, and the use of encryption and decryption for communication between the IoT device and the other end of communication (mostly a server). 

In the other article found on Google called, “5 of the biggest cybersecurity risks surrounding IoT development”.  In this article, it talks about how IoT has spread throughout the world and by 2020 we will have over 20 billion connected devices to the internet.  Going into the article it points out that mobile technology is the gold standard, meaning that everyone today uses mobile technology for everyday life to include companies.  This is important because all mobile devices should be incorporated into security procedures, the devices should be hardened just like any other system or end device.  The complexity of IoT magnifies the cyber risk.  By having more and more devices connected each day the associated risks with that grows.  The security of each node in the framework is necessary to impart security as a whole (Eastwood, G. 2017).  IoT impinges on public safety.  Not only do organizations need to worry about data breaches and data leakages, they also have to worry about access to public infrastructures like traffic lights and water services.  These systems have a much larger consequence if they are used in malicious ways.  IoT also brings privacy issues to the landscape this meaning your smartphone, cars, and smart homes.  All this information if not properly secured can be used to harvest information about an individual and take away the privacy they may have at home.  Lastly, the data volume from IoT is large and poses the threat because of the large volume.  The FTC stated that 10,000 households could generate 150 million data points daily.  That is a lot of data points for criminals. 

Work Cited:

Kumar, T. P., & Assistant Professor, TKR College of Engineering & Technology, Hyderabad, India. (2018). analysis & prevention of possible threats for internet connect

Example of someone bellow

Bruce,

The internet was never designed with security as a thought in any way.What could go wrong by connecting virtually every electronic device created to the internet?The IoT provides a lot of utility and comfort in everyday life, but it takes a serious security vulnerability and multiplies it.The biggest issue with a majority of the IoT devices is that they were also not created with security in mind.When they were created, just as the case was with the internet, it was never thought that security would be a concern.Digital Video Recorders (DVRs) is the perfect example.DVRs are one of the most vulnerable devices ever created.I personally refuse to have one in my house due to the massive security gap it puts into a home network.As a general rule, I do not want to have a large number of IoT devices in my home until there are significant security improvements.Of course I have the general things that virtually everyone has in their homes today: smart phones, iPads, iPods, Apple TV, etc.However, light bulbs, DVRs, baby monitors and doorbells are a bit much.A security vulnerability in a single one of these devices compromises all of them, just too much of a risk.

Gregg

Show more
LEARN MORE EFFECTIVELY AND GET BETTER GRADES!
Ask a Question