SlideShare a Scribd company logo
1 of 1
1) Explain your thoughts on the future of IoT and the security
implications. Why do you believe it is important to secure these
devices as they become more common in our lives and our
businesses?
2)
Securing IoT Devices: What are the Challenges?
Security practitioners suggest that key IoT security steps
include:
1) Make people aware that there is a threat to security;
2) Design a technical solution to reduce security vulnerabilities;
3) Align the legal and regulatory frameworks; and
4) Develop a workforce with the skills to handle IoT security.
Final Assignment - Project Plan (Deliverables):
Address each of the FOUR IoT security steps listed above in
terms of IoT devices.
Explain in detail, in a step-by-step guide, how to make people
more aware of the problems associated with the use of IoT
devices.

More Related Content

Similar to 1) Explain your thoughts on the future of IoT and the security impli.docx

A Study on Device Oriented Security Challenges in Internet of Things (IoT)
A Study on Device Oriented Security Challenges in Internet of Things (IoT)A Study on Device Oriented Security Challenges in Internet of Things (IoT)
A Study on Device Oriented Security Challenges in Internet of Things (IoT)Eswar Publications
 
Strengthening IoT Security Against Cyber Threats.pdf
Strengthening IoT Security Against Cyber Threats.pdfStrengthening IoT Security Against Cyber Threats.pdf
Strengthening IoT Security Against Cyber Threats.pdfSeasiaInfotech2
 
Security and Privacy in IoT and Cyber-physical Systems
Security and Privacy in IoT and Cyber-physical SystemsSecurity and Privacy in IoT and Cyber-physical Systems
Security and Privacy in IoT and Cyber-physical SystemsBob Marcus
 
What are the Challenges of IoT SecurityIoT has many of the same s.docx
What are the Challenges of IoT SecurityIoT has many of the same s.docxWhat are the Challenges of IoT SecurityIoT has many of the same s.docx
What are the Challenges of IoT SecurityIoT has many of the same s.docxalanfhall8953
 
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACT
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACTSECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACT
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACTvishal dineshkumar soni
 
assignment help experts
assignment help expertsassignment help experts
assignment help experts#essaywriting
 
Presentation on IOT SECURITY
Presentation on IOT SECURITYPresentation on IOT SECURITY
Presentation on IOT SECURITYThe Avi Sharma
 
Internet & iot security
Internet & iot securityInternet & iot security
Internet & iot securityUsman Anjum
 
A Critical Study on Security Threats, Issues, and Challenges in the Internet ...
A Critical Study on Security Threats, Issues, and Challenges in the Internet ...A Critical Study on Security Threats, Issues, and Challenges in the Internet ...
A Critical Study on Security Threats, Issues, and Challenges in the Internet ...BRNSSPublicationHubI
 
Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...
Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...
Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...Eswar Publications
 
IRJET- Internet of Things (IoT), and the Security Issues Surrounding it: ...
IRJET-  	  Internet of Things (IoT), and the Security Issues Surrounding it: ...IRJET-  	  Internet of Things (IoT), and the Security Issues Surrounding it: ...
IRJET- Internet of Things (IoT), and the Security Issues Surrounding it: ...IRJET Journal
 
Enisa report guidelines for securing the internet of things
Enisa report   guidelines for securing the internet of thingsEnisa report   guidelines for securing the internet of things
Enisa report guidelines for securing the internet of thingsnajascj
 
Io t security_review_blockchain_solutions
Io t security_review_blockchain_solutionsIo t security_review_blockchain_solutions
Io t security_review_blockchain_solutionsShyam Goyal
 
Part 1After facilities personnel consulted with your IT ma.docx
Part 1After facilities personnel consulted with your IT ma.docxPart 1After facilities personnel consulted with your IT ma.docx
Part 1After facilities personnel consulted with your IT ma.docxsmile790243
 
IoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address themIoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address themRadouane Mrabet
 
DEBJIT Doira ......... ..................
DEBJIT Doira ......... ..................DEBJIT Doira ......... ..................
DEBJIT Doira ......... ..................ARKARAJSAHA1
 
Risk Mitigation Plan Based On Inputs Provided
Risk Mitigation Plan Based On Inputs ProvidedRisk Mitigation Plan Based On Inputs Provided
Risk Mitigation Plan Based On Inputs ProvidedTiffany Graham
 

Similar to 1) Explain your thoughts on the future of IoT and the security impli.docx (20)

A Study on Device Oriented Security Challenges in Internet of Things (IoT)
A Study on Device Oriented Security Challenges in Internet of Things (IoT)A Study on Device Oriented Security Challenges in Internet of Things (IoT)
A Study on Device Oriented Security Challenges in Internet of Things (IoT)
 
Strengthening IoT Security Against Cyber Threats.pdf
Strengthening IoT Security Against Cyber Threats.pdfStrengthening IoT Security Against Cyber Threats.pdf
Strengthening IoT Security Against Cyber Threats.pdf
 
Security and Privacy in IoT and Cyber-physical Systems
Security and Privacy in IoT and Cyber-physical SystemsSecurity and Privacy in IoT and Cyber-physical Systems
Security and Privacy in IoT and Cyber-physical Systems
 
IoT Security.pdf
IoT Security.pdfIoT Security.pdf
IoT Security.pdf
 
What are the Challenges of IoT SecurityIoT has many of the same s.docx
What are the Challenges of IoT SecurityIoT has many of the same s.docxWhat are the Challenges of IoT SecurityIoT has many of the same s.docx
What are the Challenges of IoT SecurityIoT has many of the same s.docx
 
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACT
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACTSECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACT
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACT
 
sample assignment
sample assignmentsample assignment
sample assignment
 
assignment help experts
assignment help expertsassignment help experts
assignment help experts
 
Presentation on IOT SECURITY
Presentation on IOT SECURITYPresentation on IOT SECURITY
Presentation on IOT SECURITY
 
Internet & iot security
Internet & iot securityInternet & iot security
Internet & iot security
 
A Critical Study on Security Threats, Issues, and Challenges in the Internet ...
A Critical Study on Security Threats, Issues, and Challenges in the Internet ...A Critical Study on Security Threats, Issues, and Challenges in the Internet ...
A Critical Study on Security Threats, Issues, and Challenges in the Internet ...
 
Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...
Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...
Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...
 
IRJET- Internet of Things (IoT), and the Security Issues Surrounding it: ...
IRJET-  	  Internet of Things (IoT), and the Security Issues Surrounding it: ...IRJET-  	  Internet of Things (IoT), and the Security Issues Surrounding it: ...
IRJET- Internet of Things (IoT), and the Security Issues Surrounding it: ...
 
mypresentation.pdf
mypresentation.pdfmypresentation.pdf
mypresentation.pdf
 
Enisa report guidelines for securing the internet of things
Enisa report   guidelines for securing the internet of thingsEnisa report   guidelines for securing the internet of things
Enisa report guidelines for securing the internet of things
 
Io t security_review_blockchain_solutions
Io t security_review_blockchain_solutionsIo t security_review_blockchain_solutions
Io t security_review_blockchain_solutions
 
Part 1After facilities personnel consulted with your IT ma.docx
Part 1After facilities personnel consulted with your IT ma.docxPart 1After facilities personnel consulted with your IT ma.docx
Part 1After facilities personnel consulted with your IT ma.docx
 
IoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address themIoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address them
 
DEBJIT Doira ......... ..................
DEBJIT Doira ......... ..................DEBJIT Doira ......... ..................
DEBJIT Doira ......... ..................
 
Risk Mitigation Plan Based On Inputs Provided
Risk Mitigation Plan Based On Inputs ProvidedRisk Mitigation Plan Based On Inputs Provided
Risk Mitigation Plan Based On Inputs Provided
 

More from karisariddell

1. 1250 Words (min) - 1450 Words (max), Bibliography and Titles no.docx
1. 1250 Words (min) - 1450 Words (max), Bibliography and Titles no.docx1. 1250 Words (min) - 1450 Words (max), Bibliography and Titles no.docx
1. 1250 Words (min) - 1450 Words (max), Bibliography and Titles no.docxkarisariddell
 
1-Why is it the case that single men are prominently represented in .docx
1-Why is it the case that single men are prominently represented in .docx1-Why is it the case that single men are prominently represented in .docx
1-Why is it the case that single men are prominently represented in .docxkarisariddell
 
1-Think for a while about cultural practices and how they affect hea.docx
1-Think for a while about cultural practices and how they affect hea.docx1-Think for a while about cultural practices and how they affect hea.docx
1-Think for a while about cultural practices and how they affect hea.docxkarisariddell
 
1-Holding everything else constant, an increase in the growth rate.docx
1-Holding everything else constant, an increase in the growth rate.docx1-Holding everything else constant, an increase in the growth rate.docx
1-Holding everything else constant, an increase in the growth rate.docxkarisariddell
 
1-Please write the difference and examples between coccus, bacillus,.docx
1-Please write the difference and examples between coccus, bacillus,.docx1-Please write the difference and examples between coccus, bacillus,.docx
1-Please write the difference and examples between coccus, bacillus,.docxkarisariddell
 
1-2 paragraphs for each person. There are 6 people.Everett.docx
1-2 paragraphs for each person. There are 6 people.Everett.docx1-2 paragraphs for each person. There are 6 people.Everett.docx
1-2 paragraphs for each person. There are 6 people.Everett.docxkarisariddell
 
1-2 paragraphsapa formatreferencesneed in 8 hours!.docx
1-2 paragraphsapa formatreferencesneed in 8 hours!.docx1-2 paragraphsapa formatreferencesneed in 8 hours!.docx
1-2 paragraphsapa formatreferencesneed in 8 hours!.docxkarisariddell
 
1. A In your viewpoint, what are the Humanities Formulate a de.docx
1. A In your viewpoint, what are the Humanities Formulate a de.docx1. A In your viewpoint, what are the Humanities Formulate a de.docx
1. A In your viewpoint, what are the Humanities Formulate a de.docxkarisariddell
 
1-2 PAGESIdentify an ethical consideration besides establishin.docx
1-2 PAGESIdentify an ethical consideration besides establishin.docx1-2 PAGESIdentify an ethical consideration besides establishin.docx
1-2 PAGESIdentify an ethical consideration besides establishin.docxkarisariddell
 
1-2 page single spaced pages in 12-point font. Reference Listed.docx
1-2 page single spaced pages in 12-point font. Reference Listed.docx1-2 page single spaced pages in 12-point font. Reference Listed.docx
1-2 page single spaced pages in 12-point font. Reference Listed.docxkarisariddell
 
1-2 page typed (double space) research and reflection essay on a mus.docx
1-2 page typed (double space) research and reflection essay on a mus.docx1-2 page typed (double space) research and reflection essay on a mus.docx
1-2 page typed (double space) research and reflection essay on a mus.docxkarisariddell
 
1. The law of demand implies that sellers will offer .docx
1.  The law of demand implies that  sellers will offer .docx1.  The law of demand implies that  sellers will offer .docx
1. The law of demand implies that sellers will offer .docxkarisariddell
 
1-2 page critique of the film after selecting a character in the mov.docx
1-2 page critique of the film after selecting a character in the mov.docx1-2 page critique of the film after selecting a character in the mov.docx
1-2 page critique of the film after selecting a character in the mov.docxkarisariddell
 
1. Which of the following changes will result in a shift of the agg.docx
1.  Which of the following changes will result in a shift of the agg.docx1.  Which of the following changes will result in a shift of the agg.docx
1. Which of the following changes will result in a shift of the agg.docxkarisariddell
 
1-2 page critique of the film after analyzing the main character (Jo.docx
1-2 page critique of the film after analyzing the main character (Jo.docx1-2 page critique of the film after analyzing the main character (Jo.docx
1-2 page critique of the film after analyzing the main character (Jo.docxkarisariddell
 
1. John, a 15 year old who loves skateboarding, wants to buy th.docx
1.  John, a 15 year old who loves skateboarding, wants to buy th.docx1.  John, a 15 year old who loves skateboarding, wants to buy th.docx
1. John, a 15 year old who loves skateboarding, wants to buy th.docxkarisariddell
 
1-Read and print the data from the brain.csv file2-Extraxt t.docx
1-Read and print the data from the brain.csv file2-Extraxt t.docx1-Read and print the data from the brain.csv file2-Extraxt t.docx
1-Read and print the data from the brain.csv file2-Extraxt t.docxkarisariddell
 
1. Duncan Fisher (2019, march). Children of Divorce The Key Rol.docx
1.  Duncan Fisher (2019, march).  Children of Divorce The Key Rol.docx1.  Duncan Fisher (2019, march).  Children of Divorce The Key Rol.docx
1. Duncan Fisher (2019, march). Children of Divorce The Key Rol.docxkarisariddell
 
1. When Thomas Paine writes about reconciliation, he is referring .docx
1.   When Thomas Paine writes about reconciliation, he is referring .docx1.   When Thomas Paine writes about reconciliation, he is referring .docx
1. When Thomas Paine writes about reconciliation, he is referring .docxkarisariddell
 
1-This discussion question is based on pp. 135-158 ofThe E.docx
1-This discussion question is based on pp. 135-158 ofThe E.docx1-This discussion question is based on pp. 135-158 ofThe E.docx
1-This discussion question is based on pp. 135-158 ofThe E.docxkarisariddell
 

More from karisariddell (20)

1. 1250 Words (min) - 1450 Words (max), Bibliography and Titles no.docx
1. 1250 Words (min) - 1450 Words (max), Bibliography and Titles no.docx1. 1250 Words (min) - 1450 Words (max), Bibliography and Titles no.docx
1. 1250 Words (min) - 1450 Words (max), Bibliography and Titles no.docx
 
1-Why is it the case that single men are prominently represented in .docx
1-Why is it the case that single men are prominently represented in .docx1-Why is it the case that single men are prominently represented in .docx
1-Why is it the case that single men are prominently represented in .docx
 
1-Think for a while about cultural practices and how they affect hea.docx
1-Think for a while about cultural practices and how they affect hea.docx1-Think for a while about cultural practices and how they affect hea.docx
1-Think for a while about cultural practices and how they affect hea.docx
 
1-Holding everything else constant, an increase in the growth rate.docx
1-Holding everything else constant, an increase in the growth rate.docx1-Holding everything else constant, an increase in the growth rate.docx
1-Holding everything else constant, an increase in the growth rate.docx
 
1-Please write the difference and examples between coccus, bacillus,.docx
1-Please write the difference and examples between coccus, bacillus,.docx1-Please write the difference and examples between coccus, bacillus,.docx
1-Please write the difference and examples between coccus, bacillus,.docx
 
1-2 paragraphs for each person. There are 6 people.Everett.docx
1-2 paragraphs for each person. There are 6 people.Everett.docx1-2 paragraphs for each person. There are 6 people.Everett.docx
1-2 paragraphs for each person. There are 6 people.Everett.docx
 
1-2 paragraphsapa formatreferencesneed in 8 hours!.docx
1-2 paragraphsapa formatreferencesneed in 8 hours!.docx1-2 paragraphsapa formatreferencesneed in 8 hours!.docx
1-2 paragraphsapa formatreferencesneed in 8 hours!.docx
 
1. A In your viewpoint, what are the Humanities Formulate a de.docx
1. A In your viewpoint, what are the Humanities Formulate a de.docx1. A In your viewpoint, what are the Humanities Formulate a de.docx
1. A In your viewpoint, what are the Humanities Formulate a de.docx
 
1-2 PAGESIdentify an ethical consideration besides establishin.docx
1-2 PAGESIdentify an ethical consideration besides establishin.docx1-2 PAGESIdentify an ethical consideration besides establishin.docx
1-2 PAGESIdentify an ethical consideration besides establishin.docx
 
1-2 page single spaced pages in 12-point font. Reference Listed.docx
1-2 page single spaced pages in 12-point font. Reference Listed.docx1-2 page single spaced pages in 12-point font. Reference Listed.docx
1-2 page single spaced pages in 12-point font. Reference Listed.docx
 
1-2 page typed (double space) research and reflection essay on a mus.docx
1-2 page typed (double space) research and reflection essay on a mus.docx1-2 page typed (double space) research and reflection essay on a mus.docx
1-2 page typed (double space) research and reflection essay on a mus.docx
 
1. The law of demand implies that sellers will offer .docx
1.  The law of demand implies that  sellers will offer .docx1.  The law of demand implies that  sellers will offer .docx
1. The law of demand implies that sellers will offer .docx
 
1-2 page critique of the film after selecting a character in the mov.docx
1-2 page critique of the film after selecting a character in the mov.docx1-2 page critique of the film after selecting a character in the mov.docx
1-2 page critique of the film after selecting a character in the mov.docx
 
1. Which of the following changes will result in a shift of the agg.docx
1.  Which of the following changes will result in a shift of the agg.docx1.  Which of the following changes will result in a shift of the agg.docx
1. Which of the following changes will result in a shift of the agg.docx
 
1-2 page critique of the film after analyzing the main character (Jo.docx
1-2 page critique of the film after analyzing the main character (Jo.docx1-2 page critique of the film after analyzing the main character (Jo.docx
1-2 page critique of the film after analyzing the main character (Jo.docx
 
1. John, a 15 year old who loves skateboarding, wants to buy th.docx
1.  John, a 15 year old who loves skateboarding, wants to buy th.docx1.  John, a 15 year old who loves skateboarding, wants to buy th.docx
1. John, a 15 year old who loves skateboarding, wants to buy th.docx
 
1-Read and print the data from the brain.csv file2-Extraxt t.docx
1-Read and print the data from the brain.csv file2-Extraxt t.docx1-Read and print the data from the brain.csv file2-Extraxt t.docx
1-Read and print the data from the brain.csv file2-Extraxt t.docx
 
1. Duncan Fisher (2019, march). Children of Divorce The Key Rol.docx
1.  Duncan Fisher (2019, march).  Children of Divorce The Key Rol.docx1.  Duncan Fisher (2019, march).  Children of Divorce The Key Rol.docx
1. Duncan Fisher (2019, march). Children of Divorce The Key Rol.docx
 
1. When Thomas Paine writes about reconciliation, he is referring .docx
1.   When Thomas Paine writes about reconciliation, he is referring .docx1.   When Thomas Paine writes about reconciliation, he is referring .docx
1. When Thomas Paine writes about reconciliation, he is referring .docx
 
1-This discussion question is based on pp. 135-158 ofThe E.docx
1-This discussion question is based on pp. 135-158 ofThe E.docx1-This discussion question is based on pp. 135-158 ofThe E.docx
1-This discussion question is based on pp. 135-158 ofThe E.docx
 

Recently uploaded

Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupJonathanParaisoCruz
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxJiesonDelaCerna
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 

Recently uploaded (20)

Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized Group
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptx
 
ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 

1) Explain your thoughts on the future of IoT and the security impli.docx

  • 1. 1) Explain your thoughts on the future of IoT and the security implications. Why do you believe it is important to secure these devices as they become more common in our lives and our businesses? 2) Securing IoT Devices: What are the Challenges? Security practitioners suggest that key IoT security steps include: 1) Make people aware that there is a threat to security; 2) Design a technical solution to reduce security vulnerabilities; 3) Align the legal and regulatory frameworks; and 4) Develop a workforce with the skills to handle IoT security. Final Assignment - Project Plan (Deliverables): Address each of the FOUR IoT security steps listed above in terms of IoT devices. Explain in detail, in a step-by-step guide, how to make people more aware of the problems associated with the use of IoT devices.