logo

Communicating Security in the Internet of Things

   

Added on  2023-04-21

4 Pages663 Words152 Views
Internet of thing

COMMUNICATING SECURITY
1
Part 1
Bruce Scheier described the main three scenarios in their book which are
completely based on the computer security and internet of thing. In the first scenario
the author discussed the case of two researchers that control a jeep Cherokee with the
help of the internet system and they are driving on a highway. Hackers enter into their
system and change the radio station, start the wipers and kill the engine which creates
an uncertainty in the system. In the second scenario, the author described the concept
of a crash over ride attack which targeted the prykarpattyaoblenergo control system, in
western Ukraine (Schneier, 2018). In the third scenario, Bruce described the case of
printers where hackers developed a program which detected common insecure printers
and hacked them. Next, the author also explained the fundamental concept of the
internet of thing and security related issues faced by the users.
There are many security issues arises from such circumstances for example,
hacking, data breach and malicious attack, computer crimes, phishing, jamming and
other vulnerabilities.
Part 2
Question 2
The Internet is one of the biggest communication platforms where consumers
can send and receive information from other. According to the Bruce security of
computer and internet is a very complex situation because many consumers use third
party applications and unauthentic networks which are developed by hackers. There
are many reasons why the internet is not secure for example; most software is poorly
written and insecure, use of unauthentic servers, lack of security tools, and many more.
Today, the rate of hacking is growing rapidly because the market does not provide
better quality software due to which hackers can easily enter into the user computer
system and block their personal files. Many consumers use the very simple password
based system as a security tool but it is not enough to address the cyber-crimes. They
also use the low level communication networks and protocols to share or receive data
due to which the problem of data breach and cyber-crimes are increasing (Schneier,
2018).

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Foundation of Cyber Security
|6
|1679
|89

Cyber Security: BYOD Risk Assessment, Certificate-based Authentication, and Anti-phishing Guideline
|9
|2240
|285

Introduction to Cyber Security
|14
|3209
|388

Cyber Security Assignment PDF
|9
|2867
|2114

Computer Criminals, IoT, CRM and Communication Methods for Organizations
|10
|3100
|491

Impacts of Computer Crimes and Misuse on Users, Companies, and Society
|13
|4227
|329