logo

Internet of Things Security and Privacy

   

Added on  2023-06-04

16 Pages4358 Words255 Views
Running Head: INTERNET OF THINGS 0
IT RISK MANAGEMENT
INTERNET OF THINGS
(Student Details:)
9/26/2018
Internet of Things Security and Privacy_1
Internet of things 1
Executive Summary
The Internet of things helps billions of people. IoT connects thousands of smart
devices that give new experiences to people throughout the world. However, increasing
growth of connected devices increased several privacy threats and security risks. Hence,
security and privacy have become essential for the one who is operating IoT devices and
systems. There are seven kinds of threats to IoT: identification, Localization and Tracking,
Profiling, Privacy-violating interaction and presentation, Lifecycle Transitions, Inventory
Attack, and Linkage. Privacy preserving policies that need to be indulge in the corporation
are cryptography techniques, privacy awareness or context awareness, access control, and
data minimization. Due to higher complexity of IoT systems, these require end-to-end
security. Security must deal with all aspects otherwise hackers attack the weakest link and
harm the security of the organizations’ confidentiality. Fortunately, four cornerstones for
security of IoT are available: Protecting Communications, Protecting Devices, Managing
Devices, and Understanding Your System. Gigantic Corporation manufactures varieties of
software and hardware that provides its users with various telecommunication services. In
Gigantic Corporation privacy and security methods used for IoT are not enough to restrict
hackers and attackers. Therefore, there is need of improved privacy policies and security
methods. Above mentioned threats have become serious issues in the organization and need
strong and powerful security walls to restrict attackers. This report will discuss the threats
and privacy issues in the organization and also provides solutions for privacy preserving in
the organization.
Internet of Things Security and Privacy_2
Internet of things 2
Contents
Executive Summary...................................................................................................................1
Introduction................................................................................................................................4
Outline of Gigantic Corporation................................................................................................4
1. Role and responsibility....................................................................................................4
2. Technology used in Gigantic Corporation......................................................................4
Overview of Recommendation..................................................................................................5
Threats and vulnerabilities to internet of things.........................................................................5
Privacy Threats in IoT............................................................................................................6
1. Identification............................................................................................................6
2. Localisation and Tracking.......................................................................................7
3. Profiling...................................................................................................................7
4. Privacy-violating interaction and presentation........................................................7
5. Lifecycle Transitions...............................................................................................8
6. Inventory Attack......................................................................................................8
7. Linkage....................................................................................................................8
Privacy preserving solutions......................................................................................................8
1. Cryptography techniques................................................................................................8
2. Privacy awareness or context awareness.........................................................................9
3. Access Control................................................................................................................9
4. Data minimization...........................................................................................................9
Internet of Things Security and Privacy_3
Internet of things 3
IoT Security................................................................................................................................9
1. Protecting Communications:.........................................................................................10
2. Protecting Devices:.......................................................................................................10
3. Managing Devices:........................................................................................................10
4. Understanding Your System:........................................................................................11
Conclusion................................................................................................................................11
References................................................................................................................................13
Internet of Things Security and Privacy_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Network and Security
|15
|3266
|22

IoT Security & Privacy: Literature Review
|8
|1987
|72

Assignment on Cyber Crime
|15
|4799
|77

Internet of Things: Privacy Issues and Contents
|9
|1402
|116

Internet of Things (IOT) - Assignment
|10
|1770
|76

Lightweight Encryption Algorithm for Secure IOT
|53
|14901
|228