Role of Cybersecurity Protocols in Implementation of IoT Technology
VerifiedAdded on 2023/06/05
|12
|1792
|456
AI Summary
This research program aims to find out the role of cybersecurity protocols in the process of the implementation of the IoT technology and the economic impact of the delay in its launch. Literature review and proposed solutions are discussed.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
School of Computing & Mathematics
ITC571
Emerging Technologies &
Innovation
Research
Seminar Presentation
<<STUDENT ID>>
<<TOPIC>>
ITC571
Emerging Technologies &
Innovation
Research
Seminar Presentation
<<STUDENT ID>>
<<TOPIC>>
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
School of Computing & Mathematics
Introduction
IOT is not another technology all poised to hit the markets. It is not a game
player. It is a game changer that has the potential to change the economic
landscape of the world. The economies of the countries like Japan and USA
are seeking for a revival, the robotic arms, and other intelligent devices have
this potential to change the equations in their favor. In the current research
program, we are trying to find out the role of the cybersecurity protocols in the
process of the implementation of the IOT technology. This delay in the launch
of the IOT solutions is also causing a great economic impact. In the current
research, we will also try to adjudge the economic impact of the delay as well.
Introduction
IOT is not another technology all poised to hit the markets. It is not a game
player. It is a game changer that has the potential to change the economic
landscape of the world. The economies of the countries like Japan and USA
are seeking for a revival, the robotic arms, and other intelligent devices have
this potential to change the equations in their favor. In the current research
program, we are trying to find out the role of the cybersecurity protocols in the
process of the implementation of the IOT technology. This delay in the launch
of the IOT solutions is also causing a great economic impact. In the current
research, we will also try to adjudge the economic impact of the delay as well.
School of Computing & Mathematics
Literature Review
Sen, A. (2017). Your smart TV, the fridge could be hacked a lot more easily than you may
think. The Economic Times, https://economictimes.indiatimes.com/tech/internet/your-smart-
tv-fridge-could-be-hacked-a-lot-more-easily-than-you-may-think/articleshow/61037784.cms.
Economic times is among the leading business newspapers in India, author A.Sen
expressed the concerns related to the hacking abilities that can paralyze the life of people in
the era of IOT. This article emphasizes the importance of cybersecurity in the domain of the
IOT.
Rauol, V. (2018). The Cybercrime Landscape Is Evolving — Will Your Mobile Threat
Defense Strategy Keep Up? Security Intelligence, https://securityintelligence.com/the-
cybercrime-landscape-is-evolving-will-your-mobile-threat-defense-strategy-keep-up/.
Author V.Roul is a noted name in the field of cyber journalism. His article
published in security intelligence journal gives us an idea about the prevailing gap between
the widespread utility of the IOT solutions and the unavailability of the cybersecurity tools.
This article helped us in the development of an understanding related to various layers of
IOT based operations and the need of cybersecurity at every layer.
Literature Review
Sen, A. (2017). Your smart TV, the fridge could be hacked a lot more easily than you may
think. The Economic Times, https://economictimes.indiatimes.com/tech/internet/your-smart-
tv-fridge-could-be-hacked-a-lot-more-easily-than-you-may-think/articleshow/61037784.cms.
Economic times is among the leading business newspapers in India, author A.Sen
expressed the concerns related to the hacking abilities that can paralyze the life of people in
the era of IOT. This article emphasizes the importance of cybersecurity in the domain of the
IOT.
Rauol, V. (2018). The Cybercrime Landscape Is Evolving — Will Your Mobile Threat
Defense Strategy Keep Up? Security Intelligence, https://securityintelligence.com/the-
cybercrime-landscape-is-evolving-will-your-mobile-threat-defense-strategy-keep-up/.
Author V.Roul is a noted name in the field of cyber journalism. His article
published in security intelligence journal gives us an idea about the prevailing gap between
the widespread utility of the IOT solutions and the unavailability of the cybersecurity tools.
This article helped us in the development of an understanding related to various layers of
IOT based operations and the need of cybersecurity at every layer.
School of Computing & Mathematics
Literature Review
Millman, R. (2018). Nearly half of UK manufacturers victims of cybercrime. Internet of
Business, https://internetofbusiness.com/half-uk-manufacturers-victims-cybercrime/.
Author R Millman helped us in understanding a broader picture of the events
that are connected to IOT and cybersecurity. In his article published in the journal "
Internet of Business," he presented an account of the cybercrimes that can take place
once the IOT technology will roll its dice in the business scene. This article gave us an
idea of the lessons that we can learn from the past. This article also gave us an idea of
the economic implications of an IOT failure under the pressure of weak cyber security
tools.
Ismail, N. (2017). Cybersecurity in finance: How can you deal with financial
cybercrime. Information Age, https://
www.information-age.com/cyber-security-finance-can-de
The vulnerability of the IOT tools can open a new chapter in the field of financial
cyber crimes. Author N.Ismail expressed his concern over the replacement of humans
with IoT devices. The thinking pattern of the humans allows them to smell a rat
sometimes. IOT devices, on the other hand, are still not superior to counter this
intelligence level of smart hackers. This vulnerability can invite big trouble and make IoT
unfit to serve in many industry sectors.
Literature Review
Millman, R. (2018). Nearly half of UK manufacturers victims of cybercrime. Internet of
Business, https://internetofbusiness.com/half-uk-manufacturers-victims-cybercrime/.
Author R Millman helped us in understanding a broader picture of the events
that are connected to IOT and cybersecurity. In his article published in the journal "
Internet of Business," he presented an account of the cybercrimes that can take place
once the IOT technology will roll its dice in the business scene. This article gave us an
idea of the lessons that we can learn from the past. This article also gave us an idea of
the economic implications of an IOT failure under the pressure of weak cyber security
tools.
Ismail, N. (2017). Cybersecurity in finance: How can you deal with financial
cybercrime. Information Age, https://
www.information-age.com/cyber-security-finance-can-de
The vulnerability of the IOT tools can open a new chapter in the field of financial
cyber crimes. Author N.Ismail expressed his concern over the replacement of humans
with IoT devices. The thinking pattern of the humans allows them to smell a rat
sometimes. IOT devices, on the other hand, are still not superior to counter this
intelligence level of smart hackers. This vulnerability can invite big trouble and make IoT
unfit to serve in many industry sectors.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
School of Computing & Mathematics
Literature Review
Agrwal, S. (2018). HCL unveils IoT innovation labs in India, US. Economic Times,
https://economictimes.indiatimes.com/tech/ites/hcl-unveils-iot-innovation-labs-in-india-
us/articleshow/65513951.cms
.
Author S.Agrwal took us on a journey of the IoT innovation labs opened by
HCL in India, this insightful article gave us an idea about the basic nature of the IoT
services and how they can make a differnce. The cybersecurity development cells of
these facilities were the key result areas of most of the labs because as a technology
IoT is a cracked code for the developers, however, most of them are clueless about
the potential cybersecurity threats that can mark the future of this technology.
Mcguire, A. (2018). Irish companies underreporting cyber-crime. Irish Tech News,
https://irishtechnews.ie/irish-companies-under-reporting-cyber-crime/.
Author A Mcguire raised a valid question when he said that companies are
underreporting the cyber crimes and irregularities because they want to use the same
tools. The transparency offered by the IT is a big boon for the technology. Any
underestimation at any given level can create a blind spot for the cybersecurity
developers. It can also affect the security regimes connected to the IoT devices as
well.
Literature Review
Agrwal, S. (2018). HCL unveils IoT innovation labs in India, US. Economic Times,
https://economictimes.indiatimes.com/tech/ites/hcl-unveils-iot-innovation-labs-in-india-
us/articleshow/65513951.cms
.
Author S.Agrwal took us on a journey of the IoT innovation labs opened by
HCL in India, this insightful article gave us an idea about the basic nature of the IoT
services and how they can make a differnce. The cybersecurity development cells of
these facilities were the key result areas of most of the labs because as a technology
IoT is a cracked code for the developers, however, most of them are clueless about
the potential cybersecurity threats that can mark the future of this technology.
Mcguire, A. (2018). Irish companies underreporting cyber-crime. Irish Tech News,
https://irishtechnews.ie/irish-companies-under-reporting-cyber-crime/.
Author A Mcguire raised a valid question when he said that companies are
underreporting the cyber crimes and irregularities because they want to use the same
tools. The transparency offered by the IT is a big boon for the technology. Any
underestimation at any given level can create a blind spot for the cybersecurity
developers. It can also affect the security regimes connected to the IoT devices as
well.
School of Computing & Mathematics
Literature Review
Duy, J. N. (2018). The Cybersecurity Regulations Healthcare, Financial Services, and
Retail Industries Must Know About. CSO,
https://www.csoonline.com/article/3298962/security/the-cybersecurity-regulations-
healthcare-financial-services-and-retail-industries-must-know-about.html.
Healthcare, financial services, and retail are three areas where IoT devices
can bring in a revolution. Author J.N.Duy checked the readiness of these sectors to
assimilate IoT into their day-to-day culture. It was an important piece of literature for
us because it prompted us to one of the solutions that we discovered. It gave us an
insight into the end-user behavior with the IoT tools. The author suggested that end
users should share the burden of the security along with the devices. It will ease out
the pressure on the cybersecurity developers and the delay in the release of the
technology will be prevented for the time being.
Literature Review
Duy, J. N. (2018). The Cybersecurity Regulations Healthcare, Financial Services, and
Retail Industries Must Know About. CSO,
https://www.csoonline.com/article/3298962/security/the-cybersecurity-regulations-
healthcare-financial-services-and-retail-industries-must-know-about.html.
Healthcare, financial services, and retail are three areas where IoT devices
can bring in a revolution. Author J.N.Duy checked the readiness of these sectors to
assimilate IoT into their day-to-day culture. It was an important piece of literature for
us because it prompted us to one of the solutions that we discovered. It gave us an
insight into the end-user behavior with the IoT tools. The author suggested that end
users should share the burden of the security along with the devices. It will ease out
the pressure on the cybersecurity developers and the delay in the release of the
technology will be prevented for the time being.
School of Computing & Mathematics
Results/Findings
• Findings IoT is not another layer of the technology it has a deeper impact on the
economies of the future because it is a game changer that has the power to change
the business models of various markets.
• Cybersecurity is the biggest obstacle in the path of the quick release of this
technology. IoT can become a weapon of mass destruction in the hands of terror
outfits because of its active and independent machine based participation in the day-
to-day life.
• A delay in the phase vise release of the IoT has the power to create an imbalance in
the market that can lead to a recession like condition in various industry sectors.
• Cybersecurity for the IoT should be treated as a parallel industry with proactive
professionals sharing notes on different forums and contributing to the stream of
cybersecurity as a dedicated knowledge worker.
• IoT technology is poised to act as the economic driver technology for the developed
countries by supplying intelligent robotic arms for the manufacturing industry.
Results/Findings
• Findings IoT is not another layer of the technology it has a deeper impact on the
economies of the future because it is a game changer that has the power to change
the business models of various markets.
• Cybersecurity is the biggest obstacle in the path of the quick release of this
technology. IoT can become a weapon of mass destruction in the hands of terror
outfits because of its active and independent machine based participation in the day-
to-day life.
• A delay in the phase vise release of the IoT has the power to create an imbalance in
the market that can lead to a recession like condition in various industry sectors.
• Cybersecurity for the IoT should be treated as a parallel industry with proactive
professionals sharing notes on different forums and contributing to the stream of
cybersecurity as a dedicated knowledge worker.
• IoT technology is poised to act as the economic driver technology for the developed
countries by supplying intelligent robotic arms for the manufacturing industry.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
School of Computing & Mathematics
Results/Findings
Two proposed solutions for easing out the burden on the cybersecurity
Provision of a separate cloud
Internet started its journey as a backup remote medium during the days of cold war. It
was designed to store all the classified and financial data at a remote place which was
connected to the main capitals of the countries. IoT devices in Air Traffic control can
play as the device of devastation in the hands of evil forces; in order to separate them
from the mainstay of the internet we can come up with parallel secured clouds and
lines of the transmission. It will mitigate the impact of the threat; the same thing can be
applied to all the sensitive services. Prior to the arrival of the Google, a deep web was
in existence, these websites were out of the reach of Google and enjoying secured
entry protocols. IOT solutions can enjoy the same luxury of the space in a
decentralized environment and stay secured.
Cybersecurity awareness for the end users
Think about an airport terminal, all the passengers including the president of the USA
never discourage the culture of the security checks. The same thing is applicable to
the cyber security solutions developers. Instead of searching for simple solutions they
should add some difficulty levels for the end users as well. This sharing will ease out
the pressures for them and they will be able to release the technology much earlier.
Results/Findings
Two proposed solutions for easing out the burden on the cybersecurity
Provision of a separate cloud
Internet started its journey as a backup remote medium during the days of cold war. It
was designed to store all the classified and financial data at a remote place which was
connected to the main capitals of the countries. IoT devices in Air Traffic control can
play as the device of devastation in the hands of evil forces; in order to separate them
from the mainstay of the internet we can come up with parallel secured clouds and
lines of the transmission. It will mitigate the impact of the threat; the same thing can be
applied to all the sensitive services. Prior to the arrival of the Google, a deep web was
in existence, these websites were out of the reach of Google and enjoying secured
entry protocols. IOT solutions can enjoy the same luxury of the space in a
decentralized environment and stay secured.
Cybersecurity awareness for the end users
Think about an airport terminal, all the passengers including the president of the USA
never discourage the culture of the security checks. The same thing is applicable to
the cyber security solutions developers. Instead of searching for simple solutions they
should add some difficulty levels for the end users as well. This sharing will ease out
the pressures for them and they will be able to release the technology much earlier.
School of Computing & Mathematics
Conclusion
Google is planning to launch a driverless car in the coming future. Countries like Japan have ambitious
plans. They want to add their technical know-how of electronics with the technology of IOT and come up
with a blend of products. As a technology IOT is certainly knocking the doors of the economic frontiers.
Whatever we have seen so far is a small picture of the future. Currently, this technology can be counted
in the state of the research where the main focus is on the cybersecurity aspect of the applications. Once
this technology will find a place in the regular culture it will flourish like never before and it can become
the harbinger of the next industrial boom as well. Under its current status, most of the big players are
waiting for the right security and safety mechanisms to make an entry in the mainframe of development.
Conclusion
Google is planning to launch a driverless car in the coming future. Countries like Japan have ambitious
plans. They want to add their technical know-how of electronics with the technology of IOT and come up
with a blend of products. As a technology IOT is certainly knocking the doors of the economic frontiers.
Whatever we have seen so far is a small picture of the future. Currently, this technology can be counted
in the state of the research where the main focus is on the cybersecurity aspect of the applications. Once
this technology will find a place in the regular culture it will flourish like never before and it can become
the harbinger of the next industrial boom as well. Under its current status, most of the big players are
waiting for the right security and safety mechanisms to make an entry in the mainframe of development.
School of Computing & Mathematics
Reflection
Lessons learnt from ITC571
Demonstrate “capstone” linkages with other
subjects
Reflection
Lessons learnt from ITC571
Demonstrate “capstone” linkages with other
subjects
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
School of Computing & Mathematics
Refernces
Agrwal, S. (2018). HCL unveils IoT innovation labs in India, US. Economic Times,
https://economictimes.indiatimes.com/tech/ites/hcl-unveils-iot-innovation-labs-in-india-
us/articleshow/65513951.cms
.
Duy, J. N. (2018). The Cybersecurity Regulations Healthcare, Financial Services, and
Retail Industries Must Know About. CSO,
https://www.csoonline.com/article/3298962/security/the-cybersecurity-regulations-
healthcare-financial-services-and-retail-industries-must-know-about.html.
Ismail, N. (2017). Cybersecurity in finance: How can you deal with financial cybercrime.
Information Age, https://www.information-age.com/cyber-security-finance-can-deal-
financial-cybercrime-123469281/.
Mcguire, A. (2018). Irish companies underreporting cyber-crime. Irish Tech News,
https://irishtechnews.ie/irish-companies-under-reporting-cyber-crime/.
Millman, R. (2018). Nearly half of UK manufacturers victims of cybercrime. Internet of
Business, https://internetofbusiness.com/half-uk-manufacturers-victims-cybercrime/.
Refernces
Agrwal, S. (2018). HCL unveils IoT innovation labs in India, US. Economic Times,
https://economictimes.indiatimes.com/tech/ites/hcl-unveils-iot-innovation-labs-in-india-
us/articleshow/65513951.cms
.
Duy, J. N. (2018). The Cybersecurity Regulations Healthcare, Financial Services, and
Retail Industries Must Know About. CSO,
https://www.csoonline.com/article/3298962/security/the-cybersecurity-regulations-
healthcare-financial-services-and-retail-industries-must-know-about.html.
Ismail, N. (2017). Cybersecurity in finance: How can you deal with financial cybercrime.
Information Age, https://www.information-age.com/cyber-security-finance-can-deal-
financial-cybercrime-123469281/.
Mcguire, A. (2018). Irish companies underreporting cyber-crime. Irish Tech News,
https://irishtechnews.ie/irish-companies-under-reporting-cyber-crime/.
Millman, R. (2018). Nearly half of UK manufacturers victims of cybercrime. Internet of
Business, https://internetofbusiness.com/half-uk-manufacturers-victims-cybercrime/.
School of Computing & Mathematics
References
Rauol, V. (2018). The Cybercrime Landscape Is Evolving — Will Your Mobile Threat
Defense Strategy Keep Up? Security Intelligence, https://securityintelligence.com/the-
cybercrime-landscape-is-evolving-will-your-mobile-threat-defense-strategy-keep-up/.
Sen, A. (2017). Your smart TV, the fridge could be hacked a lot more easily than you may
think. The Economic Times, https://economictimes.indiatimes.com/tech/internet/your-
smart-tv-fridge-could-be-hacked-a-lot-more-easily-than-you-may-think/articleshow/
61037784.cms.
References
Rauol, V. (2018). The Cybercrime Landscape Is Evolving — Will Your Mobile Threat
Defense Strategy Keep Up? Security Intelligence, https://securityintelligence.com/the-
cybercrime-landscape-is-evolving-will-your-mobile-threat-defense-strategy-keep-up/.
Sen, A. (2017). Your smart TV, the fridge could be hacked a lot more easily than you may
think. The Economic Times, https://economictimes.indiatimes.com/tech/internet/your-
smart-tv-fridge-could-be-hacked-a-lot-more-easily-than-you-may-think/articleshow/
61037784.cms.
1 out of 12
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.