Question

What is the Internet of Things and what special problems does it pose for securing an...

  1. What is the Internet of Things and what special problems does it pose for securing an organization’s network? [MANAGEMENT OF INFORMATION SECURITY]

Homework Answers

Answer #1

Internet of Things (IoT)

Introduction:

  • It is an ecosystem of inter-connected objects/things which are connected via the internet.
  • The object/thing can be a person/animal with a bio-chip (such as pacemaker), or a wifi-enabled car, or any other object with a unique identifier and a technology to connect.
  • These devices use advanced sensors, embedded microprocessors, and other communication hardware to transmit data of their environment to each other. The devices should ideally do the work automatically.
  • The IoT refers as much to the actual network as to the fascinating use-cases that can be facilitated by it. For e.g., if IoT enabled water bottles in a hotel room are getting empty, new water bottles can be delivered to that room before the customer requests for it. A common example is that of a smart home, where an assistant such as Alexa can order groceries if they are running low from Amazon or any other store.

Security Problems:

  • Cyber Attacks: IoT has been target of various boot force and DDoS attacks. One such example is the MIrai Botnet. This is most crucial for instances involving default passwords.
  • Financial Crime: Given the rise in electronic payments, IoT has to deal with major and minor identity thefts. Social data of people is mined to extract usernames and passwords.
  • Data Security: People are always going to be concerned about their privacy. Firms dealing with intimate information of people will always have to take special precautions.
  • As more and more devices get connected, there are higher chances of hacking even the simplest of devices. For e.g., if hacked, an IoT connected charger may show 100% charge even when it is not.
  • IoT is in its nascent stage and many of its shortcomings are still unknown. Organisations will have to wait longer to more ably recognize its flaws and benefits.
Know the answer?
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for?
Ask your own homework help question
Similar Questions
Explain the ways in which undercover investigations and the use of informants pose special problems in...
Explain the ways in which undercover investigations and the use of informants pose special problems in controlling organized crime. What other methods would you suggest if you were a federal employee tasked with controlling organized crime?
What is the role of things and internet in IoT (Internet of Things)? What do you...
What is the role of things and internet in IoT (Internet of Things)? What do you think? Thank you for your help.
Research the Internet of Things. Provide a brief definition in your words what the Internet of...
Research the Internet of Things. Provide a brief definition in your words what the Internet of Things is. Move off the first page of Google results and identify some interesting products or uses that a business may want to use to improve its efficiency. There may be some creative and innovative thinking here. If you want to work with someone, I am okay with that. Please identify whom you worked with.
student name: When securing the modern enterprise, consider that IT systems do not operate alone. Securing...
student name: When securing the modern enterprise, consider that IT systems do not operate alone. Securing them involves securing their interfaces with other systems as well. It is important to know the different interconnections each system may have. Fill out the table below for four IT systems. Include the following: Note two enterprise systems they connect with and their connection type. Note two security vulnerabilities the connection may have and 2 to 4 ways each vulnerability could be potentially exploited....
Student name: When securing the modern enterprise, consider that IT systems do not operate alone. Securing...
Student name: When securing the modern enterprise, consider that IT systems do not operate alone. Securing them involves securing their interfaces with other systems as well. It is important to know the different interconnections each system may have. Fill out the table below for four IT systems. Include the following: Note two enterprise systems they connect with and their connection type. Note two security vulnerabilities the connection may have and 2 to 4 ways each vulnerability could be potentially exploited....
You are a mid-level secret service agent typically assigned to securing areas in advance of visiting...
You are a mid-level secret service agent typically assigned to securing areas in advance of visiting high-ranking U.S. Government officials, from the President on down to leadership in Congress. This year, you’ve been assigned to do advanced work for the upcoming Super Bowl, which has been deemed a National Special Security Event (NSSE). This year’s game will be played at a stadium located directly in the middle of a major metropolitan area, with many different types of businesses surrounding. Your...
What is a management maintenance model? What does it accomplish? [MANAGEMENT OF INFORMATION SECURITY][Please provide a...
What is a management maintenance model? What does it accomplish? [MANAGEMENT OF INFORMATION SECURITY][Please provide a long explanation for what it accomplished.] Thank you.
WEEK 4: NEW SECURITY MEASURES Consider your home, school, or current place of employment. What would...
WEEK 4: NEW SECURITY MEASURES Consider your home, school, or current place of employment. What would you do to increase your organization’s physical security? What do you think are the top three things to do in this realm? Try to think of the most cost-effective measures that would have the biggest impact. Does cost-effectiveness affect your top three things to do concerning security? (Please Text Format, No Pictures or Hand Written)
By doing a search of the Internet or by other research methods, find an example of...
By doing a search of the Internet or by other research methods, find an example of an organization that faced an information systems security issue or crisis. 1) How did the organization identify that there was a security problem? 2) What, if any, security infrastructure and policies were in place when the problem occurred? 3) What initial actions were taken to deal with the situation? 4) From a management perspective, what, if any, new organizational policies and procedures did they...
Define what is the superscalar processor and what does this processor do that makes it special  
Define what is the superscalar processor and what does this processor do that makes it special