logo

Internet of Things Information Security

   

Added on  2023-04-08

8 Pages1630 Words308 Views
Running head: INTERNET OF THINGS
Internet of Things Information Security
Name of Student-
Name of University-
Author’s Note-

1INTERNET OF THINGS
1. Security infrastructure needed to establish “trust” when a device connects
to the network
The devices of network infrastructure are the ideal targets for the cyber attackers. Many
organizations and the customer traffic observes critical devices such as an attacker may be
present on the gateway of the network of the organization (Kumar, Vealey & Srivastava, 2016).
The attackers can modify, deny the entry of traffic in the organization or from the organization,
modify the data or can access the data. The attacker might also be present in the internal routing
of the organization and in the switching infrastructure can leverage the trust relationship for
conducting the lateral movement to all other hosts.
One standard based security technology is the public key infrastructure (PKI). This PKI is
proven in devices and secures the devices that are connected to the network by delivering high
assurance as well as trust for many years that makes the PKI ready to manage the identities of the
devices for Internet of Things.
When a device gets connected with a network, the network must be authentic as well as
establish the trust between all other devices, users, as well as services (Hong et al., 2018). If the
trust is established, the devices, the users, and the services can communicate securely as well as
transact all encrypted data as well as information.
The organizations should deploy a security defense on the network that is robust that
includes IPS as well as IDS, firewalls, as well as solutions for email filtering for restricting the
malicious code to enter in to internal network. The organization should implement DNS (Domain
Name System) sinkholes for preventing the resolution of the illegitimate domains for restricting
the traffic. Sinkholing is the base of the DNS protocol, and all servers included are configured so

2INTERNET OF THINGS
that they provide falsified information that are compromised to the malware running machines
(Alaba et al., 2017). For this reason, the malware does not communicate with control server and
data exfiltration gets stopped. The strategy that is usually opted for implementing detection as
well as preventing the mechanism that subvert communication with malicious servers in Internet.
The sinkholes restricts the infection to occur in silent way. The perimeter defense of sinkholes
helps the organization to provide security posture in the organization.
2. Security needed to ensure personal, sensitive and financial information is
kept private and secure, and device identity is preserved
The IoT (Internet of Things) helps to make the lives much easy, but the security
consideration of the devices are to be thought of or might sacrifice the fast working of the device.
The main aim involved in identity theft is to mass the data (Borgohain, Kumar & Sanyal, 2015).
Only with some study, the user can find a huge amount of data related to identify theft. The data
that are available related to user including the information of social media, data from the smart
watches, and data from the fitness tracker can be prone to data theft by the attackers. These
devices can provide more details of the users and with more amount of data, the attack gets more
sophisticated as well as easy.
There are many ways through which the data can be protected or preserved from the
attackers are stated below:
1. Share minimum amount of data: One of the most important factor in data security is
that the user must know that who are accessed to their data, for what the data is being used and
should also know all the policies of data protection for establishing their data protection. It is
always recommended to share the least possible information while using the service and the

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Botnet operations and communication
|12
|2233
|40

Cyber Security
|1
|274
|55

Internet-wide and Distributed IoT Traffic Management PDF
|6
|5853
|56

(PDF) Study of Botnets and their threats to Internet Security
|8
|1126
|478

Internet of Things (IoT) Security: Current Status, Challenges and Prospective Measures
|12
|760
|401

Computer Security: DDoS Attacks
|11
|2444
|233