ITCC500 response Burce

Write a response 

In the literature reviews findings I found that within the peer review, “Analysis & Prevention Of Possible Threats For Internet Connected Devices In The Urban Jungle Of Internet Of Things” that security was not soundly produced in IoT.  IoT was built to help organizations manage cost of efficiencies, novel uses, and altered encounters that are alluring to the two makers and customers (Kumar, T. 2018).   In the article, it talks about how the prioritization of IoT security is paramount and must be addressed, as it is currently not being properly handled or thought about in the current design of IoT devices.  IoT devices could easily be compromised and when conducting its routine it could be sending that data from the device to a server but if that device is compromised it could be relaying the data to a malicious actors computer and not the trusted server.  Some of the proposed methods to strengthen security in IoT devices is to use the Ping/Pulse message approach have a shared secret key that is different for each device or group of devices and have it send a ping out to the server and a pulse back to the device if the shared key (secret) match.  This will enhance the security measures for IoT devices that have been compromised.  The other measure that can be used is to build a tamper proof physical casing, and the use of encryption and decryption for communication between the IoT device and the other end of communication (mostly a server). 

In the other article found on Google called, “5 of the biggest cybersecurity risks surrounding IoT development”.  In this article, it talks about how IoT has spread throughout the world and by 2020 we will have over 20 billion connected devices to the internet.  Going into the article it points out that mobile technology is the gold standard, meaning that everyone today uses mobile technology for everyday life to include companies.  This is important because all mobile devices should be incorporated into security procedures, the devices should be hardened just like any other system or end device.  The complexity of IoT magnifies the cyber risk.  By having more and more devices connected each day the associated risks with that grows.  The security of each node in the framework is necessary to impart security as a whole (Eastwood, G. 2017).  IoT impinges on public safety.  Not only do organizations need to worry about data breaches and data leakages, they also have to worry about access to public infrastructures like traffic lights and water services.  These systems have a much larger consequence if they are used in malicious ways.  IoT also brings privacy issues to the landscape this meaning your smartphone, cars, and smart homes.  All this information if not properly secured can be used to harvest information about an individual and take away the privacy they may have at home.  Lastly, the data volume from IoT is large and poses the threat because of the large volume.  The FTC stated that 10,000 households could generate 150 million data points daily.  That is a lot of data points for criminals. 

 

 

 

Work Cited:

Kumar, T. P., & Assistant Professor, TKR College of Engineering & Technology, Hyderabad, India. (2018). analysis & prevention of possible threats for internet connect

Example of someone bellow

Bruce,

 

The internet was never designed with security as a thought in any way.What could go wrong by connecting virtually every electronic device created to the internet?The IoT provides a lot of utility and comfort in everyday life, but it takes a serious security vulnerability and multiplies it.The biggest issue with a majority of the IoT devices is that they were also not created with security in mind.When they were created, just as the case was with the internet, it was never thought that security would be a concern.Digital Video Recorders (DVRs) is the perfect example.DVRs are one of the most vulnerable devices ever created.I personally refuse to have one in my house due to the massive security gap it puts into a home network.As a general rule, I do not want to have a large number of IoT devices in my home until there are significant security improvements.Of course I have the general things that virtually everyone has in their homes today: smart phones, iPads, iPods, Apple TV, etc.However, light bulbs, DVRs, baby monitors and doorbells are a bit much.A security vulnerability in a single one of these devices compromises all of them, just too much of a risk.

 

 

Gregg

Place your order
(550 words)

Approximate price: $22

Calculate the price of your order

550 words
We'll send you the first draft for approval by September 11, 2018 at 10:52 AM
Total price:
$26
The price is based on these factors:
Academic level
Number of pages
Urgency
Basic features
  • Free title page and bibliography
  • Unlimited revisions
  • Plagiarism-free guarantee
  • Money-back guarantee
  • 24/7 support
On-demand options
  • Writer’s samples
  • Part-by-part delivery
  • Overnight delivery
  • Copies of used sources
  • Expert Proofreading
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Our guarantees

Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.

Money-back guarantee

You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.

Read more

Zero-plagiarism guarantee

Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.

Read more

Free-revision policy

Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.

Read more

Privacy policy

Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.

Read more

Fair-cooperation guarantee

By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.

Read more