logo

Cyber Security and its Impact on IoT and Social Media

   

Added on  2023-04-08

5 Pages929 Words287 Views
Running head: CYBER SECURITY
Cyber Security
Name of Student-
Name of University-
Author’s Note-

1CYBER SECURITY
IoT and social media been affected by cybersecurity over time
With the new innovation of the technology, the service providers and the manufacturers
brings the products in the market ensuring the security of the technology. There are bad actors
including hackers of low level, some organized channels, or the hacktivists exploits the
vulnerability result and steals the data denying to the service access and causing cyber mayhem
(Sadeghi, Wachsmann & Waidner, 2015). The industries dealing with technology gets the
security act in the areas that includes threat intelligence, user education, firewalling, application
and network architecture, intrusion detection, including best practices and the intrusion detection.
There are many vulnerabilities in an IoT system design and those are considered as the
weakness of the IoT system. These vulnerabilities allows an attacker to execute the commands,
have access to the authorized data, as well as conduct the denial of service attacks. IoT also have
exposure which is a mistake done while configuring the system and those exposure helps the
intruder to gather information about the system.
The popularity of the social media is increasing with the increase in technology and the
concept of cyber security is used for cyberbullying, stalking or harassment. On the social media,
people share the links of the images or the pages consisting of news article or might have some
valuable information (Lu & Xu, 2018). The links provided by the people can have threat to cyber
security is the user are not sure about the security policy of the site they are using. Cyber security
risk can come from the email. The attackers might send email with malware attached and if the
user opens the attachment, their system gets prone to cyber threat and their personal information
might be accessed by the attackers.

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Threats, Attacks and Malware in IT Security - Desklib
|12
|1198
|192

Cyber Security: Policies, Training, Detection, Assessment, Recovery
|10
|1480
|414

Internet of Things (IoT) and ICT Assignment
|10
|1778
|230

Internet of Things (IOT) - Assignment
|10
|1770
|76

Department of Computer Technology PDF
|5
|4213
|21

Professional Skills In Information Communication Technology: Cyber Security
|20
|6717
|27