Chat with us, powered by LiveChat Write a response In the literature reviews findings I foun - Writeedu

Write a response In the literature reviews findings I foun

Write a response In the literature reviews findings I found that within the peer review, “Analysis & Prevention Of Possible Threats For Internet Connected Devices In The Urban Jungle Of Internet Of Things” that security was not soundly produced in IoT.  IoT was built to help organizations manage cost of efficiencies, novel uses, and altered encounters that are alluring to the two makers and customers (Kumar, T. 2018).   In the article, it talks about how the prioritization of IoT security is paramount and must be addressed, as it is currently not being properly handled or thought about in the current design of IoT devices.  IoT devices could easily be compromised and when conducting its routine it could be sending that data from the device to a server but if that device is compromised it could be relaying the data to a malicious actors computer and not the trusted server.  Some of the proposed methods to strengthen security in IoT devices is to use the Ping/Pulse message approach have a shared secret key that is different for each device or group of devices and have it send a ping out to the server and a pulse back to the device if the shared key (secret) match.  This will enhance the security measures for IoT devices that have been compromised.  The other measure that can be used is to build a tamper proof physical casing, and the use of encryption and decryption for communication between the IoT device and the other end of communication (mostly a server). In the other article found on Google called, “5 of the biggest cybersecurity risks surrounding IoT development”.  In this article, it talks about how IoT has spread throughout the world and by 2020 we will have over 20 billion connected devices to the internet.  Going into the article it points out that mobile technology is the gold standard, meaning that everyone today uses mobile technology for everyday life to include companies.  This is important because all mobile devices should be incorporated into security procedures, the devices should be hardened just like any other system or end device.  The complexity of IoT magnifies the cyber risk.  By having more and more devices connected each day the associated risks with that grows.  The security of each node in the framework is necessary to impart security as a whole (Eastwood, G. 2017).  IoT impinges on public safety.  Not only do organizations need to worry about data breaches and data leakages, they also have to worry about access to public infrastructures like traffic lights and water services.  These systems have a much larger consequence if they are used in malicious ways.  IoT also brings privacy issues to the landscape this meaning your smartphone, cars, and smart homes.  All this information if not properly secured can be used to harvest information about an individual and take away the privacy they may have at home.  Lastly, the data volume from IoT is large and poses the threat because of the large volume.  The FTC stated that 10,000 households could generate 150 million data points daily.  That is a lot of data points for criminals.    Work Cited:Kumar, T. P., & Assistant Professor, TKR College of Engineering & Technology, Hyderabad, India. (2018). analysis & prevention of possible threats for internet connectExample of someone bellowBruce, The internet was never designed with security as a thought in any way.What could go wrong by connecting virtually every electronic device created to the internet?The IoT provides a lot of utility and comfort in everyday life, but it takes a serious security vulnerability and multiplies it.The biggest issue with a majority of the IoT devices is that they were also not created with security in mind.When they were created, just as the case was with the internet, it was never thought that security would be a concern.Digital Video Recorders (DVRs) is the perfect example.DVRs are one of the most vulnerable devices ever created.I personally refuse to have one in my house due to the massive security gap it puts into a home network.As a general rule, I do not want to have a large number of IoT devices in my home until there are significant security improvements.Of course I have the general things that virtually everyone has in their homes today: smart phones, iPads, iPods, Apple TV, etc.However, light bulbs, DVRs, baby monitors and doorbells are a bit much.A security vulnerability in a single one of these devices compromises all of them, just too much of a risk.  Gregg

Our website has a team of professional writers who can help you write any of your homework. They will write your papers from scratch. We also have a team of editors just to make sure all papers are of HIGH QUALITY & PLAGIARISM FREE. To make an Order you only need to click Ask A Question and we will direct you to our Order Page at WriteEdu. Then fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.

Fill in all the assignment paper details that are required in the order form with the standard information being the page count, deadline, academic level and type of paper. It is advisable to have this information at hand so that you can quickly fill in the necessary information needed in the form for the essay writer to be immediately assigned to your writing project. Make payment for the custom essay order to enable us to assign a suitable writer to your order. Payments are made through Paypal on a secured billing page. Finally, sit back and relax.

Do you need an answer to this or any other questions?

Do you need help with this question?

Get assignment help from WriteEdu.com Paper Writing Website and forget about your problems.

WriteEdu provides custom & cheap essay writing 100% original, plagiarism free essays, assignments & dissertations.

With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.

Chat with us today! We are always waiting to answer all your questions.

Click here to Place your Order Now