IoT is an abbreviation for Internet of Things and it is an umbrella that connects a number of different components to come up with an integrated and advanced application. The components that are involved in an IoT application include technologies, processes, networks, devices, appliances and people. Some of the interesting IoT applications that have already been implemented include home automation, office automation, smart parking applications and many more (Bhabad, 2015). Such an integration of all the components has brought a lot many advantages for the users as well as for the systems. Along with the benefits, there are also some of the risks and drawbacks that are also associated with IoT apps.
The components that are involved in an IoT application include technologies, processes, networks, devices, appliances and people. Due to the presence of these components, there are several access and entry points that may be used for eavesdropping (Wood, 2016).
Information does not stay at one point or location in an IoT application. It rather travels from one place to the other which leads to the emergence of a security risk related with unauthorized tracking of the exchange taking place.
Business Intelligence concepts are significant in association with IoT and data mining is one technology that holds a lot of importance. There are however numerous security attacks related to data mining that may be executed (Amato, 2016).
Information may also be given a new shape which may lead to the loss of its meaning and value. These attacks are termed as the reconstruction attacks.
Information integrity is one of the essential properties of the IoT application and it is necessary to allow only the authorized resources to make changes in the information. However, regular attempts are made to violate the integrity of the information by altering the messages that are transferred between the entities (Microsoft, 2016).
Information integrity is one of the essential properties of the IoT application and it is necessary to allow only the authorized resources to make changes in the information. However, regular attempts are made to violate the integrity of the information by altering the media that is transferred between the entities (Aws, 2016).
Application availability on a non-stop basis is a must for experiencing enhanced user satisfaction. There are several flooding attacks that are given shape by the attackers to violate this property of information and application. Garbage data is introduced across the application channels to degrade its performance and availability (Nichols, 2016).
IoT applications involve many servers due to the presence of several components. Attackers make use of the form of attack as server impersonation to negatively impact the application availability.
Application quality and quality of all the associated services is essential for the applications. There are scenarios wherein Quality of Service (QoS) is degraded and abused by introducing several malware on the system (Panetta, 2016).
Discussion on the security issues and threats with peers was done to understand their views and two of peers with details as ABC, Male, 32 and XYZ, Female 38 were involved in the discussion.
They were also concerned with the issues around phishing and spoofing which have not been covered in the list of issues presented above. Apart from these two risks, there were similar problems that were discussed in terms of confidentiality attacks, integrity attacks and availability attacks.
The discussion enabled the participants in the understanding of the security issues in a broader manner with enhancement of knowledge around the same.
The most important lesson that was acquired from the discussion was the importance and significance of information in real life. Attacks on information can prove to be fatal and the measures that may be taken to prevent and avoid these attacks were also understood with the medium of discussion that was carried out.
The countermeasures that can be applied to put a check on the security risks and issues are classified in different categories. There may be preventive measures, control measures, measures for detection and avoidance measures that can be taken to make sure that the risks and threats are avoided.
There are several devices and appliances that are involved in the functioning and integration of the IoT applications. Physical security of these devices and appliances would be essential as the loss or damage to the device will directly impact the application and its performance. Physical security can be set up by making the users aware of the dangers that the loss of device will put on their information. Also, there shall be enhanced security on all the entry and exit points such as those for the data centres or network stations (Jing, 2014).
IoT is an umbrella that connects a number of different components to come up with an integrated and advanced application. The components that are involved in an IoT application include technologies, processes, networks, devices, appliances and people. There are several security risks and attacks that are possible on the IoT applications that may have a negative impact on the information and application availability, integrity and confidentiality. There can also be legal consequences that may result from the occurrence of a security attack as the information properties get violated in case of a risk or an attack. A particular organization is considered to deliver good performance only when there are minimum security risks reported. The frequency also decides the reputation of the organization in the market. However, the same gets violated if there are frequent attacks that take place. The countermeasures that can be applied to put a check on the security risks and issues are classified in different categories. There may be preventive measures, control measures, measures for detection and avoidance measures that can be taken to make sure that the risks and threats are avoided. There are several devices and appliances that are involved in the functioning and integration of the IoT applications. Physical security of these devices and appliances would be essential as the loss or damage to the device will directly impact the application and its performance.
Amato, N. (2016). The hidden costs of a data breach. Journal of Accountancy. Retrieved 3 May 2017, from https://www.journalofaccountancy.com/news/2016/jul/hidden-costs-of-data-breach-201614870.html
Aws,. (2016). Overview of Security Processes. Retrieved 3 May 2017, from https://d0.awsstatic.com/whitepapers/aws-security-whitepaper.pdf
Bhabad, M. (2015). Internet of Things: Architecture, Security Issues and Countermeasures. Retrieved 3 May 2017, from https://www.ijcaonline.org/research/volume125/number14/bhabad-2015-ijca-906251.pdf
Jing, Q. (2014). Security of the Internet of Things: perspectives and challenges. Retrieved 3 May 2017, from https://csi.dgist.ac.kr/uploads/Seminar/1407_IoT_SSH.pdf
Ko, M. & Dorantes, C. (2016). The impact of information security breaches on financial performance of the breached firms: An empirical investigation. Retrieved 3 May 2017, from https://jitm.ubalt.edu/XVII-2/article2.pdf
Lu, C. (2014). Overview of Security and Privacy Issues in the Internet of Things. Retrieved 3 May 2017, from https://www.cse.wustl.edu/~jain/cse574-14/ftp/security.pdf
Mahmoud, R. (2015). Internet of things (IoT) security: Current status, challenges and prospective measures - IEEE Xplore Document. Ieeexplore.ieee.org. Retrieved 3 May 2017, from https://ieeexplore.ieee.org/document/7412116/
Microsoft,. (2016). Microsoft Core Infrastructure Optimization: IT & Security Processes - Best Practices for Business IT. Microsoft.com. Retrieved 3 May 2017, from https://www.microsoft.com/india/infrastructure/capabilities/itprocesses.mspx
Nichols, A. (2016). A Perspective on Threats in the Risk Analysis Process. Sans.org. Retrieved 3 May 2017, from https://www.sans.org/reading-room/whitepapers/auditing/perspective-threats-risk-analysis-process-63
Panetta, K. (2016). Gartner's Top 10 Security Predictions 2016 - Smarter With Gartner. Smarter With Gartner. Retrieved 3 May 2017, from https://www.gartner.com/smarterwithgartner/top-10-security-predictions-2016/
Wood, P. (2016). Social hacking: The easy way to breach network security. ComputerWeekly. Retrieved 3 May 2017, from https://www.computerweekly.com/tip/Social-hacking-The-easy-way-to-breach-network-security
To export a reference to this article please select a referencing stye below:
My Assignment Help. (2018). Security And Privacy Issues In IoT . Retrieved from https://myassignmenthelp.com/free-samples/security-and-privacy-issues-in-iot.
"Security And Privacy Issues In IoT ." My Assignment Help, 2018, https://myassignmenthelp.com/free-samples/security-and-privacy-issues-in-iot.
My Assignment Help (2018) Security And Privacy Issues In IoT [Online]. Available from: https://myassignmenthelp.com/free-samples/security-and-privacy-issues-in-iot
[Accessed 24 January 2021].
My Assignment Help. 'Security And Privacy Issues In IoT ' (My Assignment Help, 2018) <https://myassignmenthelp.com/free-samples/security-and-privacy-issues-in-iot> accessed 24 January 2021.
My Assignment Help. Security And Privacy Issues In IoT [Internet]. My Assignment Help. 2018 [cited 24 January 2021]. Available from: https://myassignmenthelp.com/free-samples/security-and-privacy-issues-in-iot.
MyAssignmenthelp.com is widely acknowledged for providing affordable essay help among students in Australia. Being a cheap essay assistance service, we provide additional offers and discounts on each order. However, students don't need to worry about the quality of the paper because writers always write each paper from scratch while including all relevant research. Some of our popular services include English essay help, math essay help, marketing essay help, etc. So quit thinking 'who can help with my essay' and place an order with us.
Answer: Introduction Smiths Security is a firm located in Australia that deals with security businesses such as fire monitoring services, armored vehicles, alarm monitoring, and security guards. The head office is located in Sydney and has data center across all the major cities in Australia such as Brisbane, Perth, Melbourne, Adelaide, and Sydney). Sydney office houses the main data center. At every site there is 2 business application serve...
Read MoreAnswer: Project Title : Formation of IOT based Healthcare Mobile Application Fundamental Project Goal The goals of the ‘Formation of IOT based Healthcare Mobile Application’ project are, Formation of Mobile Application: The mobile application was developed for easing the functions of the organization. The ‘Formation of IOT based Healthcare Mobile Application’ project would result in forming the mobile application sup...
Read MoreAnswer: Section 1: Operating System Client System: The client system is the group of client or can be an individual system also. By the meaning of group it mainly indicates an organization, community or a business. The client system mainly used for communicating with a server. To elaborate the client system further in this case the Microsoft Windows operating system will be used because the Microsoft Windows has all the features which is req...
Read MoreAnswer: Introduction Malicious is a kind of malware software which is very harmful to human-computer systems. There are many forms of a malware attack, for example, viruses, spyware, rootkits, worms, and adware. In the last few years the rate of malicious attacks is increasing very fast because many consumers use wireless networks which are very less secure and hackers use malware software to block computer systems. The main purpose of ...
Read MoreAnswer: Task 1: Cost of operating the business Considering the operations of Fiction life, both Albert and Bernita work 2 and half hours a day for 3 days each, while Chris works 5 hours each day for 5 days in a week making a total of 25 hours each week. The total Annual wages for Chris sum up to $28,600, while the wages of the casual worker who stands in for Chris during his 4 week annual leave are $3,300. In addition, the total annual ...
Read MoreJust share requirement and get customized Solution.
Orders
Overall Rating
Experts
Our writers make sure that all orders are submitted, prior to the deadline.
Using reliable plagiarism detection software, Turnitin.com.We only provide customized 100 percent original papers.
Feel free to contact our assignment writing services any time via phone, email or live chat. If you are unable to calculate word count online, ask our customer executives.
Our writers can provide you professional writing assistance on any subject at any level.
Our best price guarantee ensures that the features we offer cannot be matched by any of the competitors.
Get all your documents checked for plagiarism or duplicacy with us.
Get different kinds of essays typed in minutes with clicks.
Calculate your semester grades and cumulative GPa with our GPA Calculator.
Balance any chemical equation in minutes just by entering the formula.
Calculate the number of words and number of pages of all your academic documents.
Our Mission Client Satisfaction
I was very satisfied with the expert\'s work. I would recommend this site for anyone having trouble with an assignment or trouble meeting a deadline.
Australia
Will use again, sometimes I have issues getting the creative part of writing going and love being able to reach out to help with drafts
Australia
The best way to paraphrase is to change every few words in the sentence or paragraph I want to use in my assignment.
Australia
good and excellent I am satisfied with your work. All the work done on time. Experts are good.
Australia