IoT is an abbreviation for Internet of Things and it is an umbrella that connects a number of different components to come up with an integrated and advanced application. The components that are involved in an IoT application include technologies, processes, networks, devices, appliances and people. Some of the interesting IoT applications that have already been implemented include home automation, office automation, smart parking applications and many more (Bhabad, 2015). Such an integration of all the components has brought a lot many advantages for the users as well as for the systems. Along with the benefits, there are also some of the risks and drawbacks that are also associated with IoT apps.
The components that are involved in an IoT application include technologies, processes, networks, devices, appliances and people. Due to the presence of these components, there are several access and entry points that may be used for eavesdropping (Wood, 2016).
Information does not stay at one point or location in an IoT application. It rather travels from one place to the other which leads to the emergence of a security risk related with unauthorized tracking of the exchange taking place.
Business Intelligence concepts are significant in association with IoT and data mining is one technology that holds a lot of importance. There are however numerous security attacks related to data mining that may be executed (Amato, 2016).
Information may also be given a new shape which may lead to the loss of its meaning and value. These attacks are termed as the reconstruction attacks.
Information integrity is one of the essential properties of the IoT application and it is necessary to allow only the authorized resources to make changes in the information. However, regular attempts are made to violate the integrity of the information by altering the messages that are transferred between the entities (Microsoft, 2016).
Information integrity is one of the essential properties of the IoT application and it is necessary to allow only the authorized resources to make changes in the information. However, regular attempts are made to violate the integrity of the information by altering the media that is transferred between the entities (Aws, 2016).
Application availability on a non-stop basis is a must for experiencing enhanced user satisfaction. There are several flooding attacks that are given shape by the attackers to violate this property of information and application. Garbage data is introduced across the application channels to degrade its performance and availability (Nichols, 2016).
IoT applications involve many servers due to the presence of several components. Attackers make use of the form of attack as server impersonation to negatively impact the application availability.
Application quality and quality of all the associated services is essential for the applications. There are scenarios wherein Quality of Service (QoS) is degraded and abused by introducing several malware on the system (Panetta, 2016).
Discussion on the security issues and threats with peers was done to understand their views and two of peers with details as ABC, Male, 32 and XYZ, Female 38 were involved in the discussion.
They were also concerned with the issues around phishing and spoofing which have not been covered in the list of issues presented above. Apart from these two risks, there were similar problems that were discussed in terms of confidentiality attacks, integrity attacks and availability attacks.
The discussion enabled the participants in the understanding of the security issues in a broader manner with enhancement of knowledge around the same.
The most important lesson that was acquired from the discussion was the importance and significance of information in real life. Attacks on information can prove to be fatal and the measures that may be taken to prevent and avoid these attacks were also understood with the medium of discussion that was carried out.
The countermeasures that can be applied to put a check on the security risks and issues are classified in different categories. There may be preventive measures, control measures, measures for detection and avoidance measures that can be taken to make sure that the risks and threats are avoided.
There are several devices and appliances that are involved in the functioning and integration of the IoT applications. Physical security of these devices and appliances would be essential as the loss or damage to the device will directly impact the application and its performance. Physical security can be set up by making the users aware of the dangers that the loss of device will put on their information. Also, there shall be enhanced security on all the entry and exit points such as those for the data centres or network stations (Jing, 2014).
IoT is an umbrella that connects a number of different components to come up with an integrated and advanced application. The components that are involved in an IoT application include technologies, processes, networks, devices, appliances and people. There are several security risks and attacks that are possible on the IoT applications that may have a negative impact on the information and application availability, integrity and confidentiality. There can also be legal consequences that may result from the occurrence of a security attack as the information properties get violated in case of a risk or an attack. A particular organization is considered to deliver good performance only when there are minimum security risks reported. The frequency also decides the reputation of the organization in the market. However, the same gets violated if there are frequent attacks that take place. The countermeasures that can be applied to put a check on the security risks and issues are classified in different categories. There may be preventive measures, control measures, measures for detection and avoidance measures that can be taken to make sure that the risks and threats are avoided. There are several devices and appliances that are involved in the functioning and integration of the IoT applications. Physical security of these devices and appliances would be essential as the loss or damage to the device will directly impact the application and its performance.
Amato, N. (2016). The hidden costs of a data breach. Journal of Accountancy. Retrieved 3 May 2017, from https://www.journalofaccountancy.com/news/2016/jul/hidden-costs-of-data-breach-201614870.html
Aws,. (2016). Overview of Security Processes. Retrieved 3 May 2017, from https://d0.awsstatic.com/whitepapers/aws-security-whitepaper.pdf
Bhabad, M. (2015). Internet of Things: Architecture, Security Issues and Countermeasures. Retrieved 3 May 2017, from https://www.ijcaonline.org/research/volume125/number14/bhabad-2015-ijca-906251.pdf
Jing, Q. (2014). Security of the Internet of Things: perspectives and challenges. Retrieved 3 May 2017, from https://csi.dgist.ac.kr/uploads/Seminar/1407_IoT_SSH.pdf
Ko, M. & Dorantes, C. (2016). The impact of information security breaches on financial performance of the breached firms: An empirical investigation. Retrieved 3 May 2017, from https://jitm.ubalt.edu/XVII-2/article2.pdf
Lu, C. (2014). Overview of Security and Privacy Issues in the Internet of Things. Retrieved 3 May 2017, from https://www.cse.wustl.edu/~jain/cse574-14/ftp/security.pdf
Mahmoud, R. (2015). Internet of things (IoT) security: Current status, challenges and prospective measures - IEEE Xplore Document. Ieeexplore.ieee.org. Retrieved 3 May 2017, from https://ieeexplore.ieee.org/document/7412116/
Microsoft,. (2016). Microsoft Core Infrastructure Optimization: IT & Security Processes - Best Practices for Business IT. Microsoft.com. Retrieved 3 May 2017, from https://www.microsoft.com/india/infrastructure/capabilities/itprocesses.mspx
Nichols, A. (2016). A Perspective on Threats in the Risk Analysis Process. Sans.org. Retrieved 3 May 2017, from https://www.sans.org/reading-room/whitepapers/auditing/perspective-threats-risk-analysis-process-63
Panetta, K. (2016). Gartner's Top 10 Security Predictions 2016 - Smarter With Gartner. Smarter With Gartner. Retrieved 3 May 2017, from https://www.gartner.com/smarterwithgartner/top-10-security-predictions-2016/
Wood, P. (2016). Social hacking: The easy way to breach network security. ComputerWeekly. Retrieved 3 May 2017, from https://www.computerweekly.com/tip/Social-hacking-The-easy-way-to-breach-network-security
To export a reference to this article please select a referencing stye below:
My Assignment Help. (2018). Security And Privacy Issues In IoT . Retrieved from https://myassignmenthelp.com/free-samples/security-and-privacy-issues-in-iot.
"Security And Privacy Issues In IoT ." My Assignment Help, 2018, https://myassignmenthelp.com/free-samples/security-and-privacy-issues-in-iot.
My Assignment Help (2018) Security And Privacy Issues In IoT [Online]. Available from: https://myassignmenthelp.com/free-samples/security-and-privacy-issues-in-iot
[Accessed 02 April 2020].
My Assignment Help. 'Security And Privacy Issues In IoT ' (My Assignment Help, 2018) <https://myassignmenthelp.com/free-samples/security-and-privacy-issues-in-iot> accessed 02 April 2020.
My Assignment Help. Security And Privacy Issues In IoT [Internet]. My Assignment Help. 2018 [cited 02 April 2020]. Available from: https://myassignmenthelp.com/free-samples/security-and-privacy-issues-in-iot.
MyAssignmenthelp.com is widely acknowledged for providing affordable essay help among students in Australia. Being a cheap essay assistance service, we provide additional offers and discounts on each order. However, students don't need to worry about the quality of the paper because writers always write each paper from scratch while including all relevant research. Some of our popular services include English essay help, math essay help, marketing essay help, etc. So quit thinking 'who can help with my essay' and place an order with us.
Answer: Introduction: ERP or the Enterprise Resource Planning generally refers to the system which acts as a silver bullet for each and every problem that are faced by various organizations. the implementation of the ERP system is generally associated with providing the organizations with offers related to the chances of re-engineering the business process along with helping in coordination of the systems that are located in different geographi...Read More
Answer: Security Risk Assessment Security Risks, Threats and Vulnerabilities The assessment of security risks would be based on the identification, assessment and implementation of the key controls of security within the various applications used by the industry. With the carrying out of the risk assessment within the organisation, it would be beneficial for performing a risk assessment . This form of risk assessment would be able to supp...Read More
Answer: Introduction: Australian Plastic Fabricators is one of the dynamic plastic fabrication company which is located in Sydney’s city fringe and is one of the Greater West supplying acrylic shop fittings to Sydney retail and shop fitting businesses. The organization is also considered to be the one stop shop for meeting all the needs related to Acrylic. Without any kind of doubt this organization can be considered to be the market le...Read More
Answer: Introduction The main aim of this project to develop the crack some passwords on different levels of a website. The implementing the project we can used for the ten levels that are includes are cryptography, directory traversal, sql injection, malicious redirects, Burp suites, Nmap, session management, information gathering, reporting.Postings are refreshed day by day and are utilized to spread and encourage further web hacking. Pract...Read More
Answer: Task A: The Concept of Business-To-Business (B2B) Model In this assignment, the Business-to-Business (B2B) model of e-commerce have been chosen. The B2B model of e-commerce business can be defined as the collaboration of more than two different business organisations based on performing several forms of business transactions. This scenario also depicts the involvement of businesses based within wholesalers, retailers or different manu...Read More
Just share your requirements and get customized solutions on time.
Our writers make sure that all orders are submitted, prior to the deadline.
Using reliable plagiarism detection software, Turnitin.com.We only provide customized 100 percent original papers.
Feel free to contact our assignment writing services any time via phone, email or live chat.
Our writers can provide you professional writing assistance on any subject at any level.
Our best price guarantee ensures that the features we offer cannot be matched by any of the competitors.
Get all your documents checked for plagiarism or duplicacy with us.
Get different kinds of essays typed in minutes with clicks.
Calculate your semester grades and cumulative GPa with our GPA Calculator.
Balance any chemical equation in minutes just by entering the formula.
Calculate the number of words and number of pages of all your academic documents.
Our Mission Client Satisfaction
The assignment was return to me on time has to make corrections and adjustment myself but still made a good grade. thanks
OMG this was totally better than expected and worth every penny!!! I suck at math so i\'m excited to see my grade!
Very happy with work provided by My assignment help.com. Excellent work. Always with in deadline.
Haven\'t get result yet but already feel like a great piece of writing, no disappoint.