SlideShare a Scribd company logo
1 of 4
CS155 Computer And Network Security
Answer:
The development of the Internet of Medical Things (IoMT) has brought about a major
change in the way conditions are managed; improved disease diagnosis and therapy
approaches, and healthcare costs and mistakes are reduced. Both consumers and all
frontline health practitioners have seen a significant improvement in the quality of
treatment as a result of this move. Security and privacy breaches are still a concern for the
IoMT because of the large range of IoMT suppliers and products on the market, along with
an enormous number of devices transferring sensitive medical data wirelessly into the
cloud. This might be used to collect and resell confidential information about a consumer.
The catalog's main purpose is to standardize how each known vulnerability or exposure is
defined. This is a critical aspect since security professionals may easily obtain technical
attention on a certain danger from a number of CVE-compatible sources with conventional
IDs.
Device 1: Security Camera
1-2 Brief Paragraphs Of Background Information About The Device
A user may receive and control messages and pictures through the internet using an IP
camera. Unlike classic CCTV cameras, which need a local tape recorder to record, IP cameras
just require a local area network to be used for monitoring. However, the terms "IP camera"
and "netcam" are regularly used to refer to cameras that can be watched through a network
connection and are frequently employed for surveillance (Davis, Mason & Anwar, 2020).
Most IP cameras need the assistance of a central network video recorder to record, capture
pictures, and monitor alerts (NVR). Webcams record in real time to any local or remote
storage device, therefore they may be programmed to run in a monitored mode without the
need of a network video recorder (NVR).
CVE ID (The Number Portion Of A CVE Entry, For Example, "CVE-1999-0067") And
Description Of The Known Vulnerability
CVE-2022-20033
CVE-2019-19299
CVE-2017-8221
There have much vulnerability in security cameras, cameras and motion detectors, as well
as webcams, are hacked due to a lack of basic security measures, the use of default settings
and easy passwords, and CCTV security hacking programmes.
Description Of Possible Solutions Or Resolutions Of The Vulnerability
Users must be aware of the resources accessible to them as well as any known
vulnerabilities in order to keep IP security cameras secure. Solution for vulnerability -
Inside the firm, organise and divide the network. Separating video surveillance and
telecommunications networks not only saves money, but it also reduces the risk of a
security compromise.
If the user hasn't already done so, set up a firewall as soon as possible.
Each device should have a password that is unique, long, and difficult to guess. This is a
must-have feature if the port forwarding mechanism is activated. If the system uses a VPN, a
single strong password will suffice for all camera systems (Davis, Mason & Anwar, 2020).
Every 90 days, at the very least, you should update all of your passwords.
Assist in the creation and execution of cybersecurity policies and guidelines.
All staff that will have access to the surveillance system will need to get additional safety
and security training.
Allow for two-factor or multi-factor authentication.
Your recommendation to the hospital including whether the organization should avoid
using the product or what alternative solutions should be used.
I recommend security camera to the hospital, if all possible solution of security camera is
followed then it is not easy to hack. Doing so will make it easier for the hospital authorities
to keep an eye on everyone.
Device 2: Smart Doorbells
1-2 Brief Paragraphs Of Background Information About The Device
The system is linked to the internet and sends an alert to the homeowner's smartphone or
another electrical device when a client approaches the front door. In response to the user
pressing the doorbell tab or, in the alternative case, when the doorbell identifies the user
using its built-in motion detectors, it stimulates the user. Property owners may monitor and
communicate with visitors with the smart doorbell's built-in high-definition infrared sensor
and microphone doorbell, which can be accessed through a mobile application on their
smartphone (Alharbi & Aspinall, 2018). Participants may also remotely open the gates using
a smart lock with a number of additional smart door bells available on the market.
CVE ID (The Number Portion Of A CVE Entry, For Example, "CVE-1999-0067") And
Description Of The Known Vulnerability
CVE-2021-25522
CVE-2021-41427
CVE-2021-41426
Hackers may have gained access to the Ring Doorbell's Wi-Fi enabled devices credentials,
giving them access to the Ring Doorbell's network and maybe other equipment. According
to cybersecurity specialists, Ring Doorbell Pro detectors have received a software update to
solve the issue. According to the security company, Amazon's doorbell, which would be
managed and pushed by the tech giant, provided plain text Wi-Fi passwords or unencrypted
text when it contacted the network (Davis, Mason & Anwar, 2020). This weakness might
allow attackers within the region to learn Wi-Fi credentials and perhaps gain access to
other networked devices.
Description Of Possible Solutions Or Resolutions Of The Vulnerability
Possible Solutions Of The Vulnerability:-
Make sure doorbell's firmware is up to date - Manufacturers of Wi-Fi doorbells will install
and update the camera in the same way that they do with applications, websites, and other
network devices to solve faults and vulnerabilities. When a new position for a product
becomes available, security starts with an instant firmware upgrade.
Protect the router - Most consumers forget to change the router's default password while
using a modem, putting their security at risk. Many hackers get access to the connected
system by bypassing the router. Change the default password in the router's settings menu.
Ascertain that the router's browser admin page is not accessible from the Internet (Davis,
Mason & Anwar, 2020).
Secure the communication network's integrity- The internet network is applicable to the
home Wi-Fi if consumers have a video doorbell camera installed at their residence. The
most effective thing a user can do is to set up a separate connection for the doorbell camera
or video security system.
Your recommendation to the hospital including whether the organization should avoid
using the product or what alternative solutions should be used.
I recommend the doorbell at the hospital; it is not easy to hack if all the security measures
are taken. It alerts the occupant to the presence of the visitor and protects privacy in
workplace of the hospital authorities.
References
Alharbi, R., & Aspinall, D. (2018). An IoT analysis framework: An investigation of IoT smart
cameras' vulnerabilities.
Ali, B., & Awad, A. I. (2018). Cyber and physical security vulnerability assessment for IoT-
based smart homes. sensors, 18(3), 817.
Davis, B. D., Mason, J. C., & Anwar, M. (2020). Vulnerability studies and security postures of
IoT devices: A smart home case study. IEEE Internet of Things Journal, 7(10), 10102-10110.
Davis, B. D., Mason, J. C., & Anwar, M. (2020). Vulnerability studies and security postures of
IoT devices: A smart home case study. IEEE Internet of Things Journal, 7(10), 10102-10110.

More Related Content

Similar to CS155 Computer And Network Security.docx

Effects of Backdoor Awareness on Cyber Hygiene Culture of Nigeria’s Civil Ser...
Effects of Backdoor Awareness on Cyber Hygiene Culture of Nigeria’s Civil Ser...Effects of Backdoor Awareness on Cyber Hygiene Culture of Nigeria’s Civil Ser...
Effects of Backdoor Awareness on Cyber Hygiene Culture of Nigeria’s Civil Ser...IRJET Journal
 
Effects of Backdoor Awareness on Cyber Hygiene Culture of Nigeria’s Civil Ser...
Effects of Backdoor Awareness on Cyber Hygiene Culture of Nigeria’s Civil Ser...Effects of Backdoor Awareness on Cyber Hygiene Culture of Nigeria’s Civil Ser...
Effects of Backdoor Awareness on Cyber Hygiene Culture of Nigeria’s Civil Ser...IRJET Journal
 
IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)
IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)
IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)IRJET Journal
 
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...IJCSIS Research Publications
 
Bolstering the security of iiot applications – how to go about it
Bolstering the security of iiot applications – how to go about it Bolstering the security of iiot applications – how to go about it
Bolstering the security of iiot applications – how to go about it Moon Technolabs Pvt. Ltd.
 
assignment help experts
assignment help expertsassignment help experts
assignment help experts#essaywriting
 
Telecom Resilience: Strengthening Networks through Cybersecurity Vigilance
Telecom Resilience: Strengthening Networks through Cybersecurity VigilanceTelecom Resilience: Strengthening Networks through Cybersecurity Vigilance
Telecom Resilience: Strengthening Networks through Cybersecurity VigilanceSecurityGen1
 
Unleashing the Power of Telecom Network Security.pdf
Unleashing the Power of Telecom Network Security.pdfUnleashing the Power of Telecom Network Security.pdf
Unleashing the Power of Telecom Network Security.pdfSecurityGen1
 
Strengthening Your Network Against Future Incidents with SecurityGen
Strengthening Your Network Against Future Incidents with SecurityGenStrengthening Your Network Against Future Incidents with SecurityGen
Strengthening Your Network Against Future Incidents with SecurityGenSecurityGen1
 
Electronic eye for security system @1000KV Technologies 9030844877
Electronic eye for security system @1000KV Technologies 9030844877Electronic eye for security system @1000KV Technologies 9030844877
Electronic eye for security system @1000KV Technologies 90308448771000kv technologies
 
i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation ...
i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation ...i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation ...
i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation ...ProductNation/iSPIRT
 
12 IoT Cyber Security Threats to Avoid - CyberHive.pdf
12 IoT Cyber Security Threats to Avoid - CyberHive.pdf12 IoT Cyber Security Threats to Avoid - CyberHive.pdf
12 IoT Cyber Security Threats to Avoid - CyberHive.pdfonline Marketing
 
The Consumerisation of Corporate IT
The Consumerisation of Corporate ITThe Consumerisation of Corporate IT
The Consumerisation of Corporate ITPeter Wood
 
Chapter 3_Cyber Security-ccdf.pptx
Chapter 3_Cyber Security-ccdf.pptxChapter 3_Cyber Security-ccdf.pptx
Chapter 3_Cyber Security-ccdf.pptx1SI19IS064TEJASS
 
Wireless Device and Network level security
Wireless Device and Network level securityWireless Device and Network level security
Wireless Device and Network level securityChetan Kumar S
 
IRJET- Android Device Attacks and Threats
IRJET-  	  Android Device Attacks and ThreatsIRJET-  	  Android Device Attacks and Threats
IRJET- Android Device Attacks and ThreatsIRJET Journal
 
Cyber security and cyber law
Cyber security and cyber lawCyber security and cyber law
Cyber security and cyber lawDivyank Jindal
 

Similar to CS155 Computer And Network Security.docx (20)

Effects of Backdoor Awareness on Cyber Hygiene Culture of Nigeria’s Civil Ser...
Effects of Backdoor Awareness on Cyber Hygiene Culture of Nigeria’s Civil Ser...Effects of Backdoor Awareness on Cyber Hygiene Culture of Nigeria’s Civil Ser...
Effects of Backdoor Awareness on Cyber Hygiene Culture of Nigeria’s Civil Ser...
 
Effects of Backdoor Awareness on Cyber Hygiene Culture of Nigeria’s Civil Ser...
Effects of Backdoor Awareness on Cyber Hygiene Culture of Nigeria’s Civil Ser...Effects of Backdoor Awareness on Cyber Hygiene Culture of Nigeria’s Civil Ser...
Effects of Backdoor Awareness on Cyber Hygiene Culture of Nigeria’s Civil Ser...
 
IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)
IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)
IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)
 
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
 
Bolstering the security of iiot applications – how to go about it
Bolstering the security of iiot applications – how to go about it Bolstering the security of iiot applications – how to go about it
Bolstering the security of iiot applications – how to go about it
 
Networking Expertise
Networking ExpertiseNetworking Expertise
Networking Expertise
 
assignment help experts
assignment help expertsassignment help experts
assignment help experts
 
Telecom Resilience: Strengthening Networks through Cybersecurity Vigilance
Telecom Resilience: Strengthening Networks through Cybersecurity VigilanceTelecom Resilience: Strengthening Networks through Cybersecurity Vigilance
Telecom Resilience: Strengthening Networks through Cybersecurity Vigilance
 
Unleashing the Power of Telecom Network Security.pdf
Unleashing the Power of Telecom Network Security.pdfUnleashing the Power of Telecom Network Security.pdf
Unleashing the Power of Telecom Network Security.pdf
 
Strengthening Your Network Against Future Incidents with SecurityGen
Strengthening Your Network Against Future Incidents with SecurityGenStrengthening Your Network Against Future Incidents with SecurityGen
Strengthening Your Network Against Future Incidents with SecurityGen
 
sample assignment
sample assignmentsample assignment
sample assignment
 
Wireless Security on Context (disponible en español)
Wireless Security on Context (disponible en español)Wireless Security on Context (disponible en español)
Wireless Security on Context (disponible en español)
 
Electronic eye for security system @1000KV Technologies 9030844877
Electronic eye for security system @1000KV Technologies 9030844877Electronic eye for security system @1000KV Technologies 9030844877
Electronic eye for security system @1000KV Technologies 9030844877
 
i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation ...
i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation ...i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation ...
i7 Networks - Presentation at Zensar #TechShowcase - An iSPIRT ProductNation ...
 
12 IoT Cyber Security Threats to Avoid - CyberHive.pdf
12 IoT Cyber Security Threats to Avoid - CyberHive.pdf12 IoT Cyber Security Threats to Avoid - CyberHive.pdf
12 IoT Cyber Security Threats to Avoid - CyberHive.pdf
 
The Consumerisation of Corporate IT
The Consumerisation of Corporate ITThe Consumerisation of Corporate IT
The Consumerisation of Corporate IT
 
Chapter 3_Cyber Security-ccdf.pptx
Chapter 3_Cyber Security-ccdf.pptxChapter 3_Cyber Security-ccdf.pptx
Chapter 3_Cyber Security-ccdf.pptx
 
Wireless Device and Network level security
Wireless Device and Network level securityWireless Device and Network level security
Wireless Device and Network level security
 
IRJET- Android Device Attacks and Threats
IRJET-  	  Android Device Attacks and ThreatsIRJET-  	  Android Device Attacks and Threats
IRJET- Android Device Attacks and Threats
 
Cyber security and cyber law
Cyber security and cyber lawCyber security and cyber law
Cyber security and cyber law
 

More from write31

The candidates will develop a substantive understanding of six components.docx
The candidates will develop a substantive understanding of six components.docxThe candidates will develop a substantive understanding of six components.docx
The candidates will develop a substantive understanding of six components.docxwrite31
 
Women in The Testament of the Bible shows.docx
Women in The Testament of the Bible shows.docxWomen in The Testament of the Bible shows.docx
Women in The Testament of the Bible shows.docxwrite31
 
Write a article more than 2 pages in.docx
Write a article more than 2 pages in.docxWrite a article more than 2 pages in.docx
Write a article more than 2 pages in.docxwrite31
 
Write a memo to the CIO that describes how to.docx
Write a memo to the CIO that describes how to.docxWrite a memo to the CIO that describes how to.docx
Write a memo to the CIO that describes how to.docxwrite31
 
The topic is In the Western Catholic The.docx
The topic is In the Western Catholic The.docxThe topic is In the Western Catholic The.docx
The topic is In the Western Catholic The.docxwrite31
 
Video if makes the speech compelling.docx
Video if makes the speech compelling.docxVideo if makes the speech compelling.docx
Video if makes the speech compelling.docxwrite31
 
watch the video on The Role of HR Has.docx
watch the video on The Role of HR Has.docxwatch the video on The Role of HR Has.docx
watch the video on The Role of HR Has.docxwrite31
 
There is a relationship between an emotionality and their.docx
There is a relationship between an emotionality and their.docxThere is a relationship between an emotionality and their.docx
There is a relationship between an emotionality and their.docxwrite31
 
What is required to petition is a formal letter the.docx
What is required to petition is a formal letter the.docxWhat is required to petition is a formal letter the.docx
What is required to petition is a formal letter the.docxwrite31
 
what is mental illness as an officially recognized.docx
what is mental illness as an officially recognized.docxwhat is mental illness as an officially recognized.docx
what is mental illness as an officially recognized.docxwrite31
 
With you have learned about the cell DNA.docx
With you have learned about the cell DNA.docxWith you have learned about the cell DNA.docx
With you have learned about the cell DNA.docxwrite31
 
TO EACH POST 100 WORDS MIN This.docx
TO EACH POST 100 WORDS MIN This.docxTO EACH POST 100 WORDS MIN This.docx
TO EACH POST 100 WORDS MIN This.docxwrite31
 
TO EACH POST MIN 100 WORDS In.docx
TO EACH POST MIN 100 WORDS In.docxTO EACH POST MIN 100 WORDS In.docx
TO EACH POST MIN 100 WORDS In.docxwrite31
 
Take a look back at your DPP and the Belmont.docx
Take a look back at your DPP and the Belmont.docxTake a look back at your DPP and the Belmont.docx
Take a look back at your DPP and the Belmont.docxwrite31
 
Stakeholder support is necessary for successful project Consider your.docx
Stakeholder support is necessary for successful project Consider your.docxStakeholder support is necessary for successful project Consider your.docx
Stakeholder support is necessary for successful project Consider your.docxwrite31
 
The OSI data link layer is responsible for physical.docx
The OSI data link layer is responsible for physical.docxThe OSI data link layer is responsible for physical.docx
The OSI data link layer is responsible for physical.docxwrite31
 
This assignment is intended to help you use leadership skills.docx
This assignment is intended to help you use leadership skills.docxThis assignment is intended to help you use leadership skills.docx
This assignment is intended to help you use leadership skills.docxwrite31
 
What are the different portals of entry for a pathogen.docx
What are the different portals of entry for a pathogen.docxWhat are the different portals of entry for a pathogen.docx
What are the different portals of entry for a pathogen.docxwrite31
 
You are the Social Media Manager for Savannah Technical.docx
You are the Social Media Manager for Savannah Technical.docxYou are the Social Media Manager for Savannah Technical.docx
You are the Social Media Manager for Savannah Technical.docxwrite31
 
When you are engaging it is important to understand.docx
When you are engaging it is important to understand.docxWhen you are engaging it is important to understand.docx
When you are engaging it is important to understand.docxwrite31
 

More from write31 (20)

The candidates will develop a substantive understanding of six components.docx
The candidates will develop a substantive understanding of six components.docxThe candidates will develop a substantive understanding of six components.docx
The candidates will develop a substantive understanding of six components.docx
 
Women in The Testament of the Bible shows.docx
Women in The Testament of the Bible shows.docxWomen in The Testament of the Bible shows.docx
Women in The Testament of the Bible shows.docx
 
Write a article more than 2 pages in.docx
Write a article more than 2 pages in.docxWrite a article more than 2 pages in.docx
Write a article more than 2 pages in.docx
 
Write a memo to the CIO that describes how to.docx
Write a memo to the CIO that describes how to.docxWrite a memo to the CIO that describes how to.docx
Write a memo to the CIO that describes how to.docx
 
The topic is In the Western Catholic The.docx
The topic is In the Western Catholic The.docxThe topic is In the Western Catholic The.docx
The topic is In the Western Catholic The.docx
 
Video if makes the speech compelling.docx
Video if makes the speech compelling.docxVideo if makes the speech compelling.docx
Video if makes the speech compelling.docx
 
watch the video on The Role of HR Has.docx
watch the video on The Role of HR Has.docxwatch the video on The Role of HR Has.docx
watch the video on The Role of HR Has.docx
 
There is a relationship between an emotionality and their.docx
There is a relationship between an emotionality and their.docxThere is a relationship between an emotionality and their.docx
There is a relationship between an emotionality and their.docx
 
What is required to petition is a formal letter the.docx
What is required to petition is a formal letter the.docxWhat is required to petition is a formal letter the.docx
What is required to petition is a formal letter the.docx
 
what is mental illness as an officially recognized.docx
what is mental illness as an officially recognized.docxwhat is mental illness as an officially recognized.docx
what is mental illness as an officially recognized.docx
 
With you have learned about the cell DNA.docx
With you have learned about the cell DNA.docxWith you have learned about the cell DNA.docx
With you have learned about the cell DNA.docx
 
TO EACH POST 100 WORDS MIN This.docx
TO EACH POST 100 WORDS MIN This.docxTO EACH POST 100 WORDS MIN This.docx
TO EACH POST 100 WORDS MIN This.docx
 
TO EACH POST MIN 100 WORDS In.docx
TO EACH POST MIN 100 WORDS In.docxTO EACH POST MIN 100 WORDS In.docx
TO EACH POST MIN 100 WORDS In.docx
 
Take a look back at your DPP and the Belmont.docx
Take a look back at your DPP and the Belmont.docxTake a look back at your DPP and the Belmont.docx
Take a look back at your DPP and the Belmont.docx
 
Stakeholder support is necessary for successful project Consider your.docx
Stakeholder support is necessary for successful project Consider your.docxStakeholder support is necessary for successful project Consider your.docx
Stakeholder support is necessary for successful project Consider your.docx
 
The OSI data link layer is responsible for physical.docx
The OSI data link layer is responsible for physical.docxThe OSI data link layer is responsible for physical.docx
The OSI data link layer is responsible for physical.docx
 
This assignment is intended to help you use leadership skills.docx
This assignment is intended to help you use leadership skills.docxThis assignment is intended to help you use leadership skills.docx
This assignment is intended to help you use leadership skills.docx
 
What are the different portals of entry for a pathogen.docx
What are the different portals of entry for a pathogen.docxWhat are the different portals of entry for a pathogen.docx
What are the different portals of entry for a pathogen.docx
 
You are the Social Media Manager for Savannah Technical.docx
You are the Social Media Manager for Savannah Technical.docxYou are the Social Media Manager for Savannah Technical.docx
You are the Social Media Manager for Savannah Technical.docx
 
When you are engaging it is important to understand.docx
When you are engaging it is important to understand.docxWhen you are engaging it is important to understand.docx
When you are engaging it is important to understand.docx
 

Recently uploaded

Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfDr Vijay Vishwakarma
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxJisc
 
Model Attribute _rec_name in the Odoo 17
Model Attribute _rec_name in the Odoo 17Model Attribute _rec_name in the Odoo 17
Model Attribute _rec_name in the Odoo 17Celine George
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - Englishneillewis46
 
dusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learningdusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learningMarc Dusseiller Dusjagr
 
How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17Celine George
 
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lessonQUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lessonhttgc7rh9c
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
Simple, Complex, and Compound Sentences Exercises.pdf
Simple, Complex, and Compound Sentences Exercises.pdfSimple, Complex, and Compound Sentences Exercises.pdf
Simple, Complex, and Compound Sentences Exercises.pdfstareducators107
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...EADTU
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxPooja Bhuva
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17Celine George
 
What is 3 Way Matching Process in Odoo 17.pptx
What is 3 Way Matching Process in Odoo 17.pptxWhat is 3 Way Matching Process in Odoo 17.pptx
What is 3 Way Matching Process in Odoo 17.pptxCeline George
 
How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17Celine George
 
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfFICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfPondicherry University
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
AIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptAIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptNishitharanjan Rout
 
Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111GangaMaiya1
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 

Recently uploaded (20)

Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
Model Attribute _rec_name in the Odoo 17
Model Attribute _rec_name in the Odoo 17Model Attribute _rec_name in the Odoo 17
Model Attribute _rec_name in the Odoo 17
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
dusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learningdusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learning
 
How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17
 
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lessonQUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Simple, Complex, and Compound Sentences Exercises.pdf
Simple, Complex, and Compound Sentences Exercises.pdfSimple, Complex, and Compound Sentences Exercises.pdf
Simple, Complex, and Compound Sentences Exercises.pdf
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
What is 3 Way Matching Process in Odoo 17.pptx
What is 3 Way Matching Process in Odoo 17.pptxWhat is 3 Way Matching Process in Odoo 17.pptx
What is 3 Way Matching Process in Odoo 17.pptx
 
How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17
 
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfFICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
AIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptAIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.ppt
 
Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 

CS155 Computer And Network Security.docx

  • 1. CS155 Computer And Network Security Answer: The development of the Internet of Medical Things (IoMT) has brought about a major change in the way conditions are managed; improved disease diagnosis and therapy approaches, and healthcare costs and mistakes are reduced. Both consumers and all frontline health practitioners have seen a significant improvement in the quality of treatment as a result of this move. Security and privacy breaches are still a concern for the IoMT because of the large range of IoMT suppliers and products on the market, along with an enormous number of devices transferring sensitive medical data wirelessly into the cloud. This might be used to collect and resell confidential information about a consumer. The catalog's main purpose is to standardize how each known vulnerability or exposure is defined. This is a critical aspect since security professionals may easily obtain technical attention on a certain danger from a number of CVE-compatible sources with conventional IDs. Device 1: Security Camera 1-2 Brief Paragraphs Of Background Information About The Device A user may receive and control messages and pictures through the internet using an IP camera. Unlike classic CCTV cameras, which need a local tape recorder to record, IP cameras just require a local area network to be used for monitoring. However, the terms "IP camera" and "netcam" are regularly used to refer to cameras that can be watched through a network connection and are frequently employed for surveillance (Davis, Mason & Anwar, 2020). Most IP cameras need the assistance of a central network video recorder to record, capture pictures, and monitor alerts (NVR). Webcams record in real time to any local or remote storage device, therefore they may be programmed to run in a monitored mode without the need of a network video recorder (NVR). CVE ID (The Number Portion Of A CVE Entry, For Example, "CVE-1999-0067") And Description Of The Known Vulnerability CVE-2022-20033 CVE-2019-19299 CVE-2017-8221
  • 2. There have much vulnerability in security cameras, cameras and motion detectors, as well as webcams, are hacked due to a lack of basic security measures, the use of default settings and easy passwords, and CCTV security hacking programmes. Description Of Possible Solutions Or Resolutions Of The Vulnerability Users must be aware of the resources accessible to them as well as any known vulnerabilities in order to keep IP security cameras secure. Solution for vulnerability - Inside the firm, organise and divide the network. Separating video surveillance and telecommunications networks not only saves money, but it also reduces the risk of a security compromise. If the user hasn't already done so, set up a firewall as soon as possible. Each device should have a password that is unique, long, and difficult to guess. This is a must-have feature if the port forwarding mechanism is activated. If the system uses a VPN, a single strong password will suffice for all camera systems (Davis, Mason & Anwar, 2020). Every 90 days, at the very least, you should update all of your passwords. Assist in the creation and execution of cybersecurity policies and guidelines. All staff that will have access to the surveillance system will need to get additional safety and security training. Allow for two-factor or multi-factor authentication. Your recommendation to the hospital including whether the organization should avoid using the product or what alternative solutions should be used. I recommend security camera to the hospital, if all possible solution of security camera is followed then it is not easy to hack. Doing so will make it easier for the hospital authorities to keep an eye on everyone. Device 2: Smart Doorbells 1-2 Brief Paragraphs Of Background Information About The Device The system is linked to the internet and sends an alert to the homeowner's smartphone or another electrical device when a client approaches the front door. In response to the user pressing the doorbell tab or, in the alternative case, when the doorbell identifies the user using its built-in motion detectors, it stimulates the user. Property owners may monitor and communicate with visitors with the smart doorbell's built-in high-definition infrared sensor and microphone doorbell, which can be accessed through a mobile application on their smartphone (Alharbi & Aspinall, 2018). Participants may also remotely open the gates using a smart lock with a number of additional smart door bells available on the market. CVE ID (The Number Portion Of A CVE Entry, For Example, "CVE-1999-0067") And Description Of The Known Vulnerability
  • 3. CVE-2021-25522 CVE-2021-41427 CVE-2021-41426 Hackers may have gained access to the Ring Doorbell's Wi-Fi enabled devices credentials, giving them access to the Ring Doorbell's network and maybe other equipment. According to cybersecurity specialists, Ring Doorbell Pro detectors have received a software update to solve the issue. According to the security company, Amazon's doorbell, which would be managed and pushed by the tech giant, provided plain text Wi-Fi passwords or unencrypted text when it contacted the network (Davis, Mason & Anwar, 2020). This weakness might allow attackers within the region to learn Wi-Fi credentials and perhaps gain access to other networked devices. Description Of Possible Solutions Or Resolutions Of The Vulnerability Possible Solutions Of The Vulnerability:- Make sure doorbell's firmware is up to date - Manufacturers of Wi-Fi doorbells will install and update the camera in the same way that they do with applications, websites, and other network devices to solve faults and vulnerabilities. When a new position for a product becomes available, security starts with an instant firmware upgrade. Protect the router - Most consumers forget to change the router's default password while using a modem, putting their security at risk. Many hackers get access to the connected system by bypassing the router. Change the default password in the router's settings menu. Ascertain that the router's browser admin page is not accessible from the Internet (Davis, Mason & Anwar, 2020). Secure the communication network's integrity- The internet network is applicable to the home Wi-Fi if consumers have a video doorbell camera installed at their residence. The most effective thing a user can do is to set up a separate connection for the doorbell camera or video security system. Your recommendation to the hospital including whether the organization should avoid using the product or what alternative solutions should be used. I recommend the doorbell at the hospital; it is not easy to hack if all the security measures are taken. It alerts the occupant to the presence of the visitor and protects privacy in workplace of the hospital authorities. References Alharbi, R., & Aspinall, D. (2018). An IoT analysis framework: An investigation of IoT smart cameras' vulnerabilities.
  • 4. Ali, B., & Awad, A. I. (2018). Cyber and physical security vulnerability assessment for IoT- based smart homes. sensors, 18(3), 817. Davis, B. D., Mason, J. C., & Anwar, M. (2020). Vulnerability studies and security postures of IoT devices: A smart home case study. IEEE Internet of Things Journal, 7(10), 10102-10110. Davis, B. D., Mason, J. C., & Anwar, M. (2020). Vulnerability studies and security postures of IoT devices: A smart home case study. IEEE Internet of Things Journal, 7(10), 10102-10110.