This presentation explores the security issues linked to IoT and evaluates the mitigation techniques. It discusses the risks of data breach, DOS attack, malware attack, and more.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Internet of things (IoT) Security
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Introduction OThe term IoT is defined as the internet of thing which is an ecosystem of linked physical devices which are accessible by using the internet. OIt is a type of system which is used for interconnecting computing devices with each other. OThe aim of this presentation is to explore the security issues linked to IoT and evaluate the mitigation techniques. OIoT plays an important part in the field of computer networks where it helps consumers for controlling devices from any location (Ashraf, and Habaebi, 2015). (Source: Ashraf, and Habaebi, 2015)
Background OThis study mainly focuses on the security threats occurred on the internet of thing. OIt is identified that security and privacy of data both are very common problems associated with IoT devices. OGenerally, IoT uses internet connectivity for exchanging information which also increases several security risks in IoT such as data breach, DOS attack, malware attack and so on. OAll these attacks and issues will be discussed in this presentation and identify the risk factors linked with IoT technology.
Analysis OIt is analysed that security is the biggest concern faced by consumers while using IoT devices. ODue to security risks companies and users can suffer from the data breach related issues. OA recent study argued that lack of security and use of unauthorized servers both are major risk factors. OThese risk factors increase the problem of cyber-attacks in IoT (Dabbagh, and Rayes, 2019).
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Analysis (Security issues) OThere are various security risks occurred in the internet of thing which are described below: OData breach ODOS attack OMalware attack OData Authentication OPhishing attack (Vilalta, et al., 2016). OCisco Talos is one of the best examples which were suffered from data breach while using IoT devices. (Source: Vilalta, et al., 2016).
Analysis (Security issues) OData breach OIt is a common vulnerability occurred in IoT where criminals attack on the communication systems. OIn which consumers access unwanted links and websites in their system which increase the issue of the data breach. ODOS attack OIt is a denial of service attack which is a cyber attack where hackers produce a huge amount of traffic signals using botnet process. OMoreover, transfer these signals to the networks of IoT that reduce the security of devices and help attackers for accessing data of users (Lin, et al., 2017).
Analysis (Security issue) OMalware attack OIt is a part of cyber-crimes where attackers use malware software for performing activities on the user’s IoT devices. OIn which attackers produce viruses for reducing the performance of IoT networks and block the private details of users. OData authentication OThe main problem of users is that they use unauthentic servers while using IoT devices which impact on the data of users. OLack of proper authentication enhances the rate of data loss in the IoT. OPhishing attack OIn which hackers send the fraud links and spam mails to the users in order to access their computer and IoT devices. OConsumers access these fraud links using IoT devices which impact on the performance of the internet of things and lead the issue of a data breach (Banerjee, Lee, and Choo, 2018).
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Validity of arguments (mitigation tools or recommendation) OThere are the following recommendations can be used for mitigating security problems: OUse only authentic networks OConsumers should focus on the security of data OCompanies should develop security policies while using IoT devices OUpdate computer software on regular basis OAvoid third party applications and fraud links OAdopt firewall and antiviruses ODesign and implement encryption technique while exchanging information
Validity of arguments (Conclusion) OFrom this study, it is concluded that the lack of proper security and utilization of unauthorized networks can lead the security issues in IoT. OThis research identified and the security risks faced by consumers while using IoT devices. OIt is identified that malware and DOS both are very common security issues occurred in IoT. OIt is recommended that Cisco Talos and other organizations should focus on security and develop proper privacy plans while using IoT devices.
References OAshraf, Q.M. and Habaebi, M.H., (2015) Autonomic schemes for threat mitigation in Internet of Things.Journal of Network and Computer Applications, 49(2), pp.112-127. ODabbagh, M. and Rayes, A., (2019) Internet of things security and privacy. InInternet of Things From Hype to Reality, 12(2), pp. 211-238. OBanerjee, M., Lee, J. and Choo, K.K.R., (2018) A blockchain future for internet of things security: A position paper.Digital Communications and Networks, 4(3), pp.149-160. OLin, J., Yu, W., Zhang, N., Yang, X., Zhang, H. and Zhao, W., (2017) A survey on internet of things: Architecture, enabling technologies, security and privacy, and applications.IEEE Internet of Things Journal, 4(5), pp.1125-1142. OVilalta, R., Ciungu, R., Mayoral, A., Casellas, R., Martinez, R., Pubill, D., Serra, J., Munoz, R. and Verikoukis, C., (2016) Improving security in internet of things with software defined networking. In2016 IEEE Global Communications Conference (GLOBECOM), 10(6), pp. 1-6.