Internet of Things (IoT) Research Paper 2022
Added on 2022-10-18
16 Pages3575 Words31 Views
Internet of Things
Name
Institution
Professor
Course
Date
Name
Institution
Professor
Course
Date
Abstract
The Internet of Things (IoT) has made possible for devices to communicate over the internet and
share data without any human intervention. In this regard, most of the studies on IoT have
concentrated on its use and application but security concerns have not been addressed. For the
secure implementation of IoT, security experts should be involved during and after its
implementation. The review of the past studies focuses on security aspects such as types of risks,
threats, security control and techniques that should be implemented to secure IoT infrastructure.
Countermeasures such data encryption during transmission, network protection through
SSL/TLS and creating strong authentication credentials to avoid SQL injection and cross-site
scripting. Similarly, the trends on the IoT has been analyzed to come up with expected changes
that might come up as a result of adopting required security measures. The security measures
such as incorporating Blockchain technology has been addressed to make sure IoT security is
given the highest priority.
The Internet of Things (IoT) has made possible for devices to communicate over the internet and
share data without any human intervention. In this regard, most of the studies on IoT have
concentrated on its use and application but security concerns have not been addressed. For the
secure implementation of IoT, security experts should be involved during and after its
implementation. The review of the past studies focuses on security aspects such as types of risks,
threats, security control and techniques that should be implemented to secure IoT infrastructure.
Countermeasures such data encryption during transmission, network protection through
SSL/TLS and creating strong authentication credentials to avoid SQL injection and cross-site
scripting. Similarly, the trends on the IoT has been analyzed to come up with expected changes
that might come up as a result of adopting required security measures. The security measures
such as incorporating Blockchain technology has been addressed to make sure IoT security is
given the highest priority.
Contents
Abstract....................................................................................................................... 2
Introduction.................................................................................................................. 3
Application of Internet of Things....................................................................................... 4
Types of Risks in the Internet of Things..............................................................................5
Threats and countermeasures on the Internet of Things.........................................................6
A comparison of cybersecurity threats................................................................................9
Future Trends in Internet of Things................................................................................. 10
Conclusion.................................................................................................................. 11
Bibliography............................................................................................................... 12
Appendix.................................................................................................................... 13
Introduction
The paper would highlight security and ethical issues on the Internet of Things (IoT). It
would majorly focus on data collection, transmission and protection. With IoT, it has been
Abstract....................................................................................................................... 2
Introduction.................................................................................................................. 3
Application of Internet of Things....................................................................................... 4
Types of Risks in the Internet of Things..............................................................................5
Threats and countermeasures on the Internet of Things.........................................................6
A comparison of cybersecurity threats................................................................................9
Future Trends in Internet of Things................................................................................. 10
Conclusion.................................................................................................................. 11
Bibliography............................................................................................................... 12
Appendix.................................................................................................................... 13
Introduction
The paper would highlight security and ethical issues on the Internet of Things (IoT). It
would majorly focus on data collection, transmission and protection. With IoT, it has been
possible to automate most of the electrical appliances to communicate with each other. When
addressing IoT, security concerns have not been dealt with adequately making it difficult for
users to decide which security parameters to focus on during its implementation (Leloglu 2017,
pp. 121-122).
The security of on IoT cannot be addressed without addressing ethical concerns which
may arise from the implementation and use of the Internet of Things. The topic is very important
because of the ever-increasing cybersecurity attacks on Internet of Things data and devices
(Leloglu 2017, pp. 121-122). It is very sensitive to technological and social aspect due to the
impact it has on personal data and IoT devices.
The article would cover the overview of IoT, its benefits in both local and industrial use
and application in the key sectors of the economy. First, the application of the Internet of Things
in the various economic sectors and the impact (Allhoff & Henschke 2018, pp. 56). Next, the
evolution of the Internet of Things in terms of legislation, security and ethical concerns. Finally,
the types of risks involved and countermeasures to protect data privacy would be substantially
discussed.
The position of the paper is to shed light on the security threats, data protection, and
privacy of data, ethical issues and trends on the Internet of Things (IoT). The discussion would
be based on, security threats, data protection and countermeasures in security data collected over
the IoT.
addressing IoT, security concerns have not been dealt with adequately making it difficult for
users to decide which security parameters to focus on during its implementation (Leloglu 2017,
pp. 121-122).
The security of on IoT cannot be addressed without addressing ethical concerns which
may arise from the implementation and use of the Internet of Things. The topic is very important
because of the ever-increasing cybersecurity attacks on Internet of Things data and devices
(Leloglu 2017, pp. 121-122). It is very sensitive to technological and social aspect due to the
impact it has on personal data and IoT devices.
The article would cover the overview of IoT, its benefits in both local and industrial use
and application in the key sectors of the economy. First, the application of the Internet of Things
in the various economic sectors and the impact (Allhoff & Henschke 2018, pp. 56). Next, the
evolution of the Internet of Things in terms of legislation, security and ethical concerns. Finally,
the types of risks involved and countermeasures to protect data privacy would be substantially
discussed.
The position of the paper is to shed light on the security threats, data protection, and
privacy of data, ethical issues and trends on the Internet of Things (IoT). The discussion would
be based on, security threats, data protection and countermeasures in security data collected over
the IoT.
End of preview
Want to access all the pages? Upload your documents or become a member.
Related Documents
Emerging Threats and Counter Measurementslg...
|4
|866
|38
Security in the Internet of Things Assignment PDFlg...
|12
|489
|132
Internet of Things: A Review of Literature and Security Issueslg...
|8
|810
|321
Cloud Computing in IoT Security: Issues, Threats, and Countermeasureslg...
|14
|4648
|362
Utilizing Blockchain in Internet of Thingslg...
|25
|6891
|265
Smart Connected Home Architecture, Threats and Countermeasures.lg...
|17
|4151
|17