SlideShare a Scribd company logo
1 of 6
The Internet of Things (IoT) brings tremendous new capabilities
to the net -- but it also brings many new security issues. Watch
the following video on securing the Internet of Things:
https://www.youtube.com/watch?v=rZ6xoAtdF3o
Discuss the challenges of securing the IoT. Then, list five or
more best practices you would recommend.
Make sure you respond to at least two other learners.
Response#1(Leburu)
Internet of Things (IoT):
The digital space has undergone major changes over the past
two years and will continue to evolve, according to industry
experts. The last entry in digital space is the Internet of Things
(IoT). IoT can also be defined as an interaction between the
software, telecommunications and electronic devices industries
and promises to offer enormous opportunities for many sectors.
With the advent of the Internet of Things (IoT), powered by
sensors that will soon be available for billions of dollars, that
will work with billions of intelligent systems and cover millions
of applications, the Internet of Things will ignite a spark.
Launch new consumer and business behaviors requiring
increasingly intelligent industrial solutions, which in turn create
billions of dollars of opportunities for the IT industry and even
more for companies that benefit from the Internet of Things.
(Shackelford, S. 2020).
The Internet of Things has three distinct parts: Sensors that
collect data (including sensor / device identifier and address),
Decision-making and data transfer to decision servers, An
application that collects and analyzes this data for greater
integration.
Big data analytics and mechanisms can be used to make
decisions. Several countries, such as the United States, South
Korea and China, have taken the will to exploit the Internet.
The main players in IoT initiatives are citizens, governments,
and industry. Participation and cooperation of all interested
parties at an appropriate time. At this point, we require
instructions to link and select key areas, then emphasize the
answers to the accumulation, The Internet of Things needs to
have a clear strategy and follow a simple goal with the Value-
Added and Reduce-cost models. With industry associations,
experience in global forums, knowledge of other major IoT
countries, and the active participation of global partners, we can
promote an approach. More creative based on innovation. The
key to the success of the Internet lies in the development of
open platforms for scalable, easy-to-use and inexpensive models
and citizens, such as sensors. Data should be clearly collected
and shared between functions to maximize benefits.
Lack Of Compliance On The Part Of IoT Manufacturers:
New IoT devices come out almost daily, all with undiscovered
vulnerabilities. The primary source of most IoT security issues
is that manufacturers do not spend enough time and resources
on security.
For example, most fitness trackers with Bluetooth remain
visible after the first pairing, a smart refrigerator can expose
Gmail login credentials, and a smart fingerprint padlock can be
accessed with a Bluetooth key that has the same MAC address
as the padlock device.
Lack Of User Knowledge & Awareness :
Over the years, Internet users have learnt how to avoid spam or
phishing emails, perform virus scans on their PCs, and secure
their WiFi networks with strong passwords. But IoT is a new
technology, and people still do not know much about it. While
most of the risks of IoT security issues are still on the
manufacturing side, users and businesses processes can create
bigger threats. One of the biggest IoT security risks and
challenges is the user’s ignorance and lack of awareness of the
IoT functionality. As a result, everybody is put at risk.
Transportation; intelligent systems of transportation are today
moving people and goods from one place to another. Lots of IoT
sensors are used on planes, trains, ships and vehicles with the
main goal of optimizing performance of engines, safety as well
as managing the supply chain. IoT in smart cars helps drivers
prevent accidents from occurring as they can predict situations
as well as maintaining the issues. One of the most important
benefits of the Internet of Things is the ease of participation to
the individual or an organization that uses the IoT. By far one
of the greatest benefits of IoT is the people can now take full
control over their lives and can make some great improvements
in their everyday lives.
Reponse#2(Srikanth)
The term Internet of things (IoT)was first coined by Kevin
Ashton, an executive director of the Auto-ID in massachute
institute of Technology. It refers to a network of physical
objects, places and environments which use sensors as well as
APIs to connect and exchange data over the internet. A good
example of an IOT object is a thermostat which is a home
appliance that can be used in determining when an individual
occupy various rooms and causing alteration of the levels of
heating, lighting and other house functions. (Alam, S. 2020,
February).
Some of the characteristics of IoT include: intelligence; the
internet of things has a combination of algorithms and
computations, software and hardware which makes it very
smart. Presence of ambient intelligence in IoTincreases its
capabilities thus facilitating intelligent response of things to
situations as well as supporting them in doing specific tasks.
IoTisalso dynamic in nature. The main activity of IoT is
collecting data from its environment and this can be achieved
with the changes taking place around the device. Sensing is
another key characteristic of IoT. According to3, sensors are the
ones that make IoT possible as they have the ability of detecting
or measuring any changes that occur in the environment so as to
generate data that can report on their status.Sensing devices
include sport sensors, environment sensors like a thermostat and
physical health sensors.
Three areas of applications for IoT:
IoT continues to have a significant impact on many industries as
well as businesses. The three areas of application for IoT
include; Manufacturing; production of goods in the
manufacturing industry has been transformed by IoTsince
manufacturers use the industrial internet of things (IIoT)as well
as Machine to Machine (M2M) communications to drive
automation in the industry5. Prediction and prevention of
equipment failures has also been made possible by IoT and this
has helped in improving the safety of workers as well as
enhancing efficiency in production of goods
Healthcare; the system of connected healthcare and smart
medical devices have a great potential both in companies and
for the well-being of human beings.IoT is used in healthcare
with an aim of empowering human beings to live lives that are
health through wearing connected devices. Some of the common
IoT applications in healthcare include telemonitoring and
remote monitoring.6projects that between 2017 and 2022, IoT
healthcare applications will accelerate as it is an important
element in the digital transformation in the healthcare industry.
Studies have also shown that countries like the US are leading
in the use of healthcare IoT.7in their studies also pointed that
30 percent of healthcare organizations are already using IoT for
data that is sensitive.
Analyse critically, three current or future security issues in IoT
and its countermeasures:
Just as4pointed out, IoT devices have a high vulnerability to
security threats. Some of the security issues in IOT include;
Insecure web interface; the web interfaces that are built onto
IOT devices allow interactions between the user and the device
but at the same time can also allow an attacker to get access to
the device and make changes that may cause negatively affect
data. According to8such security vulnerabilities are caused by
Account enumeration, weak default credential, weak account
lockout settings and injection of SQL to the device.
Insufficient authentication; this involves presence of ineffective
mechanisms for authentication of the IOT user interface as well
as poor mechanisms for authorization. Such threats are caused
by lack of two factor authentications, lack of password
complexity as well as insecure password recovery which can
easily make an attacker gain access to important information
and altering it.
Privacy concerns; lack of privacy in IOT is usually caused by
collecting personal data that is unnecessary as well as
insufficient protection of that data. Some of the measures
suggested by9 for dealing with privacy issues include;
collecting data that is only crucial to the functionality of the
device, ensuring that the IOT device and its components are
protect provide proper protection to personal information.

More Related Content

Similar to The Internet of Things (IoT) brings tremendous new capabilities .docx

Analyzing IoT’s significance when combined with Big Data Analytics, AI, Edge ...
Analyzing IoT’s significance when combined with Big Data Analytics, AI, Edge ...Analyzing IoT’s significance when combined with Big Data Analytics, AI, Edge ...
Analyzing IoT’s significance when combined with Big Data Analytics, AI, Edge ...Anil
 
Internet of Things Challenges and Solutions
Internet of Things Challenges and SolutionsInternet of Things Challenges and Solutions
Internet of Things Challenges and Solutionsijtsrd
 
hahahafunnyjokes.blogspot.com-Complete Introduction to IoT.pdf
hahahafunnyjokes.blogspot.com-Complete Introduction to IoT.pdfhahahafunnyjokes.blogspot.com-Complete Introduction to IoT.pdf
hahahafunnyjokes.blogspot.com-Complete Introduction to IoT.pdfRamiz ALI
 
Application and Usefulness of Internet of Things in Information Technology
Application and Usefulness of Internet of Things in Information TechnologyApplication and Usefulness of Internet of Things in Information Technology
Application and Usefulness of Internet of Things in Information TechnologyDr. Amarjeet Singh
 
10 things i wish someone told me before i decided to become an io t applicati...
10 things i wish someone told me before i decided to become an io t applicati...10 things i wish someone told me before i decided to become an io t applicati...
10 things i wish someone told me before i decided to become an io t applicati...Pavan Kumar
 
FUTURE AND CHALLENGES OF INTERNET OF THINGS
FUTURE AND CHALLENGES OF INTERNET OF THINGS FUTURE AND CHALLENGES OF INTERNET OF THINGS
FUTURE AND CHALLENGES OF INTERNET OF THINGS ijcsit
 
A Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of ThingsA Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of Thingsijsrd.com
 
Internet of things
Internet of thingsInternet of things
Internet of thingsvarungoyal98
 
The Impact of Internet of Things (IoT) on Software Development.pdf
The Impact of Internet of Things (IoT) on Software Development.pdfThe Impact of Internet of Things (IoT) on Software Development.pdf
The Impact of Internet of Things (IoT) on Software Development.pdfBahaa Al Zubaidi
 
IoT Trends to Drive Innovation for Business 2019-2020
IoT Trends to Drive Innovation for Business 2019-2020IoT Trends to Drive Innovation for Business 2019-2020
IoT Trends to Drive Innovation for Business 2019-2020Takayuki Yamazaki
 
Internet of Things (IoT).pptx
Internet of Things (IoT).pptxInternet of Things (IoT).pptx
Internet of Things (IoT).pptxTech Bikram
 
Compiler design presentaion
Compiler design presentaionCompiler design presentaion
Compiler design presentaionMdShahinAlam25
 
Using Machine Learning to Build a Classification Model for IoT Networks to De...
Using Machine Learning to Build a Classification Model for IoT Networks to De...Using Machine Learning to Build a Classification Model for IoT Networks to De...
Using Machine Learning to Build a Classification Model for IoT Networks to De...IJCNCJournal
 
White Paper: IoT Security – Protecting the Networked Society
White Paper: IoT Security – Protecting the Networked SocietyWhite Paper: IoT Security – Protecting the Networked Society
White Paper: IoT Security – Protecting the Networked SocietyEricsson
 

Similar to The Internet of Things (IoT) brings tremendous new capabilities .docx (20)

Analyzing IoT’s significance when combined with Big Data Analytics, AI, Edge ...
Analyzing IoT’s significance when combined with Big Data Analytics, AI, Edge ...Analyzing IoT’s significance when combined with Big Data Analytics, AI, Edge ...
Analyzing IoT’s significance when combined with Big Data Analytics, AI, Edge ...
 
IoT and Smart Cities
IoT and Smart CitiesIoT and Smart Cities
IoT and Smart Cities
 
Internet of Things Challenges and Solutions
Internet of Things Challenges and SolutionsInternet of Things Challenges and Solutions
Internet of Things Challenges and Solutions
 
hahahafunnyjokes.blogspot.com-Complete Introduction to IoT.pdf
hahahafunnyjokes.blogspot.com-Complete Introduction to IoT.pdfhahahafunnyjokes.blogspot.com-Complete Introduction to IoT.pdf
hahahafunnyjokes.blogspot.com-Complete Introduction to IoT.pdf
 
Application and Usefulness of Internet of Things in Information Technology
Application and Usefulness of Internet of Things in Information TechnologyApplication and Usefulness of Internet of Things in Information Technology
Application and Usefulness of Internet of Things in Information Technology
 
10 things i wish someone told me before i decided to become an io t applicati...
10 things i wish someone told me before i decided to become an io t applicati...10 things i wish someone told me before i decided to become an io t applicati...
10 things i wish someone told me before i decided to become an io t applicati...
 
FUTURE AND CHALLENGES OF INTERNET OF THINGS
FUTURE AND CHALLENGES OF INTERNET OF THINGS FUTURE AND CHALLENGES OF INTERNET OF THINGS
FUTURE AND CHALLENGES OF INTERNET OF THINGS
 
FUTURE AND CHALLENGES OF INTERNET OF THINGS
FUTURE AND CHALLENGES OF INTERNET OF THINGS FUTURE AND CHALLENGES OF INTERNET OF THINGS
FUTURE AND CHALLENGES OF INTERNET OF THINGS
 
A Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of ThingsA Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of Things
 
IOT by himanshu.ppt
IOT by himanshu.pptIOT by himanshu.ppt
IOT by himanshu.ppt
 
Future of Internet.pptx
Future of Internet.pptxFuture of Internet.pptx
Future of Internet.pptx
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
The Impact of Internet of Things (IoT) on Software Development.pdf
The Impact of Internet of Things (IoT) on Software Development.pdfThe Impact of Internet of Things (IoT) on Software Development.pdf
The Impact of Internet of Things (IoT) on Software Development.pdf
 
IoT Trends to Drive Innovation for Business 2019-2020
IoT Trends to Drive Innovation for Business 2019-2020IoT Trends to Drive Innovation for Business 2019-2020
IoT Trends to Drive Innovation for Business 2019-2020
 
Internet of Things (IoT).pptx
Internet of Things (IoT).pptxInternet of Things (IoT).pptx
Internet of Things (IoT).pptx
 
Compiler design presentaion
Compiler design presentaionCompiler design presentaion
Compiler design presentaion
 
Using Machine Learning to Build a Classification Model for IoT Networks to De...
Using Machine Learning to Build a Classification Model for IoT Networks to De...Using Machine Learning to Build a Classification Model for IoT Networks to De...
Using Machine Learning to Build a Classification Model for IoT Networks to De...
 
Varun IOTs PPT
Varun  IOTs PPTVarun  IOTs PPT
Varun IOTs PPT
 
iot ppt.pptx
iot ppt.pptxiot ppt.pptx
iot ppt.pptx
 
White Paper: IoT Security – Protecting the Networked Society
White Paper: IoT Security – Protecting the Networked SocietyWhite Paper: IoT Security – Protecting the Networked Society
White Paper: IoT Security – Protecting the Networked Society
 

More from jmindy

The Law of Healthcare AdministrationAuthorsShowalter,.docx
The Law of Healthcare AdministrationAuthorsShowalter,.docxThe Law of Healthcare AdministrationAuthorsShowalter,.docx
The Law of Healthcare AdministrationAuthorsShowalter,.docxjmindy
 
The law that legalized medical marijuana in Florida in 2016Wri.docx
The law that legalized medical marijuana in Florida in 2016Wri.docxThe law that legalized medical marijuana in Florida in 2016Wri.docx
The law that legalized medical marijuana in Florida in 2016Wri.docxjmindy
 
The latter half of the twentieth century witnessed the rise of the i.docx
The latter half of the twentieth century witnessed the rise of the i.docxThe latter half of the twentieth century witnessed the rise of the i.docx
The latter half of the twentieth century witnessed the rise of the i.docxjmindy
 
The larger the mass of a star, the higher the internal pressures. Hi.docx
The larger the mass of a star, the higher the internal pressures. Hi.docxThe larger the mass of a star, the higher the internal pressures. Hi.docx
The larger the mass of a star, the higher the internal pressures. Hi.docxjmindy
 
The Latin term meaning father of his country” which is implied as m.docx
The Latin term meaning father of his country” which is implied as m.docxThe Latin term meaning father of his country” which is implied as m.docx
The Latin term meaning father of his country” which is implied as m.docxjmindy
 
THE LASTING IMPACT OF MENDEZ V. WESTMINSTER IN THE STRUGGLE .docx
THE LASTING IMPACT OF MENDEZ V. WESTMINSTER IN THE STRUGGLE .docxTHE LASTING IMPACT OF MENDEZ V. WESTMINSTER IN THE STRUGGLE .docx
THE LASTING IMPACT OF MENDEZ V. WESTMINSTER IN THE STRUGGLE .docxjmindy
 
The late 1920s and 1930s were a time when many Americans endured the.docx
The late 1920s and 1930s were a time when many Americans endured the.docxThe late 1920s and 1930s were a time when many Americans endured the.docx
The late 1920s and 1930s were a time when many Americans endured the.docxjmindy
 
The last term you attended at Waldorf you dropped a course while on .docx
The last term you attended at Waldorf you dropped a course while on .docxThe last term you attended at Waldorf you dropped a course while on .docx
The last term you attended at Waldorf you dropped a course while on .docxjmindy
 
The last topic to be covered in this course is Chapter 14, Social .docx
The last topic to be covered in this course is Chapter 14, Social .docxThe last topic to be covered in this course is Chapter 14, Social .docx
The last topic to be covered in this course is Chapter 14, Social .docxjmindy
 
The last quarter of the 19th century saw a shift within the art worl.docx
The last quarter of the 19th century saw a shift within the art worl.docxThe last quarter of the 19th century saw a shift within the art worl.docx
The last quarter of the 19th century saw a shift within the art worl.docxjmindy
 
The last answer didnt actually help, so I am reposting this.P.docx
The last answer didnt actually help, so I am reposting this.P.docxThe last answer didnt actually help, so I am reposting this.P.docx
The last answer didnt actually help, so I am reposting this.P.docxjmindy
 
The Lab assignment will be graded out of 100 points.  There are .docx
The Lab assignment will be graded out of 100 points.  There are .docxThe Lab assignment will be graded out of 100 points.  There are .docx
The Lab assignment will be graded out of 100 points.  There are .docxjmindy
 
The knowledge of your Learning Patterns provides you with an .docx
The knowledge of your Learning Patterns provides you with an .docxThe knowledge of your Learning Patterns provides you with an .docx
The knowledge of your Learning Patterns provides you with an .docxjmindy
 
The Kite Runner contains many families that suffer in their own uniq.docx
The Kite Runner contains many families that suffer in their own uniq.docxThe Kite Runner contains many families that suffer in their own uniq.docx
The Kite Runner contains many families that suffer in their own uniq.docxjmindy
 
The Key cross-cultural themes of the project are country values and .docx
The Key cross-cultural themes of the project are country values and .docxThe Key cross-cultural themes of the project are country values and .docx
The Key cross-cultural themes of the project are country values and .docxjmindy
 
The kind of relationships that society expects from its citizens an.docx
The kind of relationships that society expects from its citizens an.docxThe kind of relationships that society expects from its citizens an.docx
The kind of relationships that society expects from its citizens an.docxjmindy
 
THE KING COMPANY BACKGROUND The King Company experiences man.docx
THE KING COMPANY BACKGROUND      The  King Company experiences man.docxTHE KING COMPANY BACKGROUND      The  King Company experiences man.docx
THE KING COMPANY BACKGROUND The King Company experiences man.docxjmindy
 
The Kind of leader I want to beAbout 1 pageTell the type.docx
The Kind of leader I want to beAbout 1 pageTell the type.docxThe Kind of leader I want to beAbout 1 pageTell the type.docx
The Kind of leader I want to beAbout 1 pageTell the type.docxjmindy
 
The kickback mineWhat seemed an ordinary case became more intrig.docx
The kickback mineWhat seemed an ordinary case became more intrig.docxThe kickback mineWhat seemed an ordinary case became more intrig.docx
The kickback mineWhat seemed an ordinary case became more intrig.docxjmindy
 
The key issue is why its challenging to implement transformational .docx
The key issue is why its challenging to implement transformational .docxThe key issue is why its challenging to implement transformational .docx
The key issue is why its challenging to implement transformational .docxjmindy
 

More from jmindy (20)

The Law of Healthcare AdministrationAuthorsShowalter,.docx
The Law of Healthcare AdministrationAuthorsShowalter,.docxThe Law of Healthcare AdministrationAuthorsShowalter,.docx
The Law of Healthcare AdministrationAuthorsShowalter,.docx
 
The law that legalized medical marijuana in Florida in 2016Wri.docx
The law that legalized medical marijuana in Florida in 2016Wri.docxThe law that legalized medical marijuana in Florida in 2016Wri.docx
The law that legalized medical marijuana in Florida in 2016Wri.docx
 
The latter half of the twentieth century witnessed the rise of the i.docx
The latter half of the twentieth century witnessed the rise of the i.docxThe latter half of the twentieth century witnessed the rise of the i.docx
The latter half of the twentieth century witnessed the rise of the i.docx
 
The larger the mass of a star, the higher the internal pressures. Hi.docx
The larger the mass of a star, the higher the internal pressures. Hi.docxThe larger the mass of a star, the higher the internal pressures. Hi.docx
The larger the mass of a star, the higher the internal pressures. Hi.docx
 
The Latin term meaning father of his country” which is implied as m.docx
The Latin term meaning father of his country” which is implied as m.docxThe Latin term meaning father of his country” which is implied as m.docx
The Latin term meaning father of his country” which is implied as m.docx
 
THE LASTING IMPACT OF MENDEZ V. WESTMINSTER IN THE STRUGGLE .docx
THE LASTING IMPACT OF MENDEZ V. WESTMINSTER IN THE STRUGGLE .docxTHE LASTING IMPACT OF MENDEZ V. WESTMINSTER IN THE STRUGGLE .docx
THE LASTING IMPACT OF MENDEZ V. WESTMINSTER IN THE STRUGGLE .docx
 
The late 1920s and 1930s were a time when many Americans endured the.docx
The late 1920s and 1930s were a time when many Americans endured the.docxThe late 1920s and 1930s were a time when many Americans endured the.docx
The late 1920s and 1930s were a time when many Americans endured the.docx
 
The last term you attended at Waldorf you dropped a course while on .docx
The last term you attended at Waldorf you dropped a course while on .docxThe last term you attended at Waldorf you dropped a course while on .docx
The last term you attended at Waldorf you dropped a course while on .docx
 
The last topic to be covered in this course is Chapter 14, Social .docx
The last topic to be covered in this course is Chapter 14, Social .docxThe last topic to be covered in this course is Chapter 14, Social .docx
The last topic to be covered in this course is Chapter 14, Social .docx
 
The last quarter of the 19th century saw a shift within the art worl.docx
The last quarter of the 19th century saw a shift within the art worl.docxThe last quarter of the 19th century saw a shift within the art worl.docx
The last quarter of the 19th century saw a shift within the art worl.docx
 
The last answer didnt actually help, so I am reposting this.P.docx
The last answer didnt actually help, so I am reposting this.P.docxThe last answer didnt actually help, so I am reposting this.P.docx
The last answer didnt actually help, so I am reposting this.P.docx
 
The Lab assignment will be graded out of 100 points.  There are .docx
The Lab assignment will be graded out of 100 points.  There are .docxThe Lab assignment will be graded out of 100 points.  There are .docx
The Lab assignment will be graded out of 100 points.  There are .docx
 
The knowledge of your Learning Patterns provides you with an .docx
The knowledge of your Learning Patterns provides you with an .docxThe knowledge of your Learning Patterns provides you with an .docx
The knowledge of your Learning Patterns provides you with an .docx
 
The Kite Runner contains many families that suffer in their own uniq.docx
The Kite Runner contains many families that suffer in their own uniq.docxThe Kite Runner contains many families that suffer in their own uniq.docx
The Kite Runner contains many families that suffer in their own uniq.docx
 
The Key cross-cultural themes of the project are country values and .docx
The Key cross-cultural themes of the project are country values and .docxThe Key cross-cultural themes of the project are country values and .docx
The Key cross-cultural themes of the project are country values and .docx
 
The kind of relationships that society expects from its citizens an.docx
The kind of relationships that society expects from its citizens an.docxThe kind of relationships that society expects from its citizens an.docx
The kind of relationships that society expects from its citizens an.docx
 
THE KING COMPANY BACKGROUND The King Company experiences man.docx
THE KING COMPANY BACKGROUND      The  King Company experiences man.docxTHE KING COMPANY BACKGROUND      The  King Company experiences man.docx
THE KING COMPANY BACKGROUND The King Company experiences man.docx
 
The Kind of leader I want to beAbout 1 pageTell the type.docx
The Kind of leader I want to beAbout 1 pageTell the type.docxThe Kind of leader I want to beAbout 1 pageTell the type.docx
The Kind of leader I want to beAbout 1 pageTell the type.docx
 
The kickback mineWhat seemed an ordinary case became more intrig.docx
The kickback mineWhat seemed an ordinary case became more intrig.docxThe kickback mineWhat seemed an ordinary case became more intrig.docx
The kickback mineWhat seemed an ordinary case became more intrig.docx
 
The key issue is why its challenging to implement transformational .docx
The key issue is why its challenging to implement transformational .docxThe key issue is why its challenging to implement transformational .docx
The key issue is why its challenging to implement transformational .docx
 

Recently uploaded

18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupJonathanParaisoCruz
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 

Recently uploaded (20)

18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized Group
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 

The Internet of Things (IoT) brings tremendous new capabilities .docx

  • 1. The Internet of Things (IoT) brings tremendous new capabilities to the net -- but it also brings many new security issues. Watch the following video on securing the Internet of Things: https://www.youtube.com/watch?v=rZ6xoAtdF3o Discuss the challenges of securing the IoT. Then, list five or more best practices you would recommend. Make sure you respond to at least two other learners. Response#1(Leburu) Internet of Things (IoT): The digital space has undergone major changes over the past two years and will continue to evolve, according to industry experts. The last entry in digital space is the Internet of Things (IoT). IoT can also be defined as an interaction between the software, telecommunications and electronic devices industries and promises to offer enormous opportunities for many sectors. With the advent of the Internet of Things (IoT), powered by sensors that will soon be available for billions of dollars, that will work with billions of intelligent systems and cover millions of applications, the Internet of Things will ignite a spark. Launch new consumer and business behaviors requiring increasingly intelligent industrial solutions, which in turn create
  • 2. billions of dollars of opportunities for the IT industry and even more for companies that benefit from the Internet of Things. (Shackelford, S. 2020). The Internet of Things has three distinct parts: Sensors that collect data (including sensor / device identifier and address), Decision-making and data transfer to decision servers, An application that collects and analyzes this data for greater integration. Big data analytics and mechanisms can be used to make decisions. Several countries, such as the United States, South Korea and China, have taken the will to exploit the Internet. The main players in IoT initiatives are citizens, governments, and industry. Participation and cooperation of all interested parties at an appropriate time. At this point, we require instructions to link and select key areas, then emphasize the answers to the accumulation, The Internet of Things needs to have a clear strategy and follow a simple goal with the Value- Added and Reduce-cost models. With industry associations, experience in global forums, knowledge of other major IoT countries, and the active participation of global partners, we can promote an approach. More creative based on innovation. The key to the success of the Internet lies in the development of open platforms for scalable, easy-to-use and inexpensive models and citizens, such as sensors. Data should be clearly collected and shared between functions to maximize benefits. Lack Of Compliance On The Part Of IoT Manufacturers: New IoT devices come out almost daily, all with undiscovered vulnerabilities. The primary source of most IoT security issues is that manufacturers do not spend enough time and resources on security. For example, most fitness trackers with Bluetooth remain
  • 3. visible after the first pairing, a smart refrigerator can expose Gmail login credentials, and a smart fingerprint padlock can be accessed with a Bluetooth key that has the same MAC address as the padlock device. Lack Of User Knowledge & Awareness : Over the years, Internet users have learnt how to avoid spam or phishing emails, perform virus scans on their PCs, and secure their WiFi networks with strong passwords. But IoT is a new technology, and people still do not know much about it. While most of the risks of IoT security issues are still on the manufacturing side, users and businesses processes can create bigger threats. One of the biggest IoT security risks and challenges is the user’s ignorance and lack of awareness of the IoT functionality. As a result, everybody is put at risk. Transportation; intelligent systems of transportation are today moving people and goods from one place to another. Lots of IoT sensors are used on planes, trains, ships and vehicles with the main goal of optimizing performance of engines, safety as well as managing the supply chain. IoT in smart cars helps drivers prevent accidents from occurring as they can predict situations as well as maintaining the issues. One of the most important benefits of the Internet of Things is the ease of participation to the individual or an organization that uses the IoT. By far one of the greatest benefits of IoT is the people can now take full control over their lives and can make some great improvements in their everyday lives. Reponse#2(Srikanth)
  • 4. The term Internet of things (IoT)was first coined by Kevin Ashton, an executive director of the Auto-ID in massachute institute of Technology. It refers to a network of physical objects, places and environments which use sensors as well as APIs to connect and exchange data over the internet. A good example of an IOT object is a thermostat which is a home appliance that can be used in determining when an individual occupy various rooms and causing alteration of the levels of heating, lighting and other house functions. (Alam, S. 2020, February). Some of the characteristics of IoT include: intelligence; the internet of things has a combination of algorithms and computations, software and hardware which makes it very smart. Presence of ambient intelligence in IoTincreases its capabilities thus facilitating intelligent response of things to situations as well as supporting them in doing specific tasks. IoTisalso dynamic in nature. The main activity of IoT is collecting data from its environment and this can be achieved with the changes taking place around the device. Sensing is another key characteristic of IoT. According to3, sensors are the ones that make IoT possible as they have the ability of detecting or measuring any changes that occur in the environment so as to generate data that can report on their status.Sensing devices include sport sensors, environment sensors like a thermostat and physical health sensors. Three areas of applications for IoT: IoT continues to have a significant impact on many industries as well as businesses. The three areas of application for IoT include; Manufacturing; production of goods in the manufacturing industry has been transformed by IoTsince manufacturers use the industrial internet of things (IIoT)as well as Machine to Machine (M2M) communications to drive
  • 5. automation in the industry5. Prediction and prevention of equipment failures has also been made possible by IoT and this has helped in improving the safety of workers as well as enhancing efficiency in production of goods Healthcare; the system of connected healthcare and smart medical devices have a great potential both in companies and for the well-being of human beings.IoT is used in healthcare with an aim of empowering human beings to live lives that are health through wearing connected devices. Some of the common IoT applications in healthcare include telemonitoring and remote monitoring.6projects that between 2017 and 2022, IoT healthcare applications will accelerate as it is an important element in the digital transformation in the healthcare industry. Studies have also shown that countries like the US are leading in the use of healthcare IoT.7in their studies also pointed that 30 percent of healthcare organizations are already using IoT for data that is sensitive. Analyse critically, three current or future security issues in IoT and its countermeasures: Just as4pointed out, IoT devices have a high vulnerability to security threats. Some of the security issues in IOT include; Insecure web interface; the web interfaces that are built onto IOT devices allow interactions between the user and the device but at the same time can also allow an attacker to get access to the device and make changes that may cause negatively affect data. According to8such security vulnerabilities are caused by Account enumeration, weak default credential, weak account lockout settings and injection of SQL to the device. Insufficient authentication; this involves presence of ineffective mechanisms for authentication of the IOT user interface as well as poor mechanisms for authorization. Such threats are caused
  • 6. by lack of two factor authentications, lack of password complexity as well as insecure password recovery which can easily make an attacker gain access to important information and altering it. Privacy concerns; lack of privacy in IOT is usually caused by collecting personal data that is unnecessary as well as insufficient protection of that data. Some of the measures suggested by9 for dealing with privacy issues include; collecting data that is only crucial to the functionality of the device, ensuring that the IOT device and its components are protect provide proper protection to personal information.