logo

Critical Thinking Internet of Things

2 Pages725 Words35 Views
   

Added on  2020-05-16

Critical Thinking Internet of Things

   Added on 2020-05-16

ShareRelated Documents
Critical ThinkingInternet of ThingsBaljinder KaurAbstract – Internet of Things is one of the upcoming network options which enablesinanimate objects be connected via a network and use of sensors. The technology howeverhas its own limitations since its security can be breached and can lead to a massive andfatal loss of data. Nevertheless, the risk of security breach cannot be completely avoidedbut can be reduced.Keywords – Internet of Things; Security; Attack; Breach; Vulnerability;I.INTRODUCTIONInternet of Things refers to a system of interrelated computing devices that are connectedthrough the internet[ CITATION And16 \l 1033 ]. This is done by using sensors which enablethe devices get stimulated by something in their environment or from another device. Thedevice will then react by performing another action after the stimulus is detected or received.II.LITERATUREA security breach is an incident that results in unauthorized access of data, applications,services, networks or devices by bypassing their underlying security mechanisms. Thisoccurs when an application, individual or device accesses a confidential, private orunauthorized logical perimeter[ CITATION Tec18 \l 1033 ]. Therefore, a security breach islike digital trespassing.For Internet of Things a security breach can be on a sensor, the network as a whole or just adevice. By attacking any part of the system, one can elicit actions that are different from whatshould happen.There are different types of attacks that one can launch on a system. The major attacks on IoTare: Denial of service where the network is made unable to perform its usual tasks by beingflooded by spam requests, social engineering which involves manipulating people to give upconfidential information, data and identity theft, man-in-the-middle attack where an attackerintercepts communication between two systems and botnets which are a group of systemsthat are combined for remotely taking control and distributing malware[ CITATION Lea16 \l1033 ].III.BUSINESS CASEA pair of security researchers demonstrated at a Black hat hacker conference in 2015 how tohack a wirelessly connected sniper rifle from a company by the name TrackPoint. The deviceallowed attackers to exploit the vulnerabilities remotely or when connected to the network bylogging into its network which had a default password. Once logged in, one had administrative access to the device. This could enable one tocompletely disable the device or even change its targets.IV.ANALYSIS
Critical Thinking Internet of Things_1

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Internet of Things Privacy and Security Issues
|10
|2130
|317

Internet of Things (IoT) Security
|9
|2735
|258

Wireless Network Vulnerabilities and Security Measures - Desklib
|7
|1988
|258

Security Issues in Internet of Things
|2
|1166
|378

Network Vulnerability And Penetration Testing Assignment
|6
|1145
|23

Securing the Enterprise Infrastructure Report 2022
|4
|772
|15