logo

Internet of Things (IoT) Security: Real World Example, Solution and Conclusion

The assignment involves exploring Pretty Good Privacy (PGP) encryption program and analyzing a recent case in network security to provide a theoretical solution.

5 Pages1410 Words66 Views
   

Added on  2023-06-11

About This Document

This article discusses the security risks associated with the Internet of Things (IoT) and provides a real-world example of a Jeep Cherokee being hacked. It also offers a solution to prevent such attacks and concludes with the importance of security in IoT.

Internet of Things (IoT) Security: Real World Example, Solution and Conclusion

The assignment involves exploring Pretty Good Privacy (PGP) encryption program and analyzing a recent case in network security to provide a theoretical solution.

   Added on 2023-06-11

ShareRelated Documents
Student Name
Institution Affiliation
Facilitator
Course Name
Date
Internet of Things (IoT) Security: Real World Example, Solution and Conclusion_1
I. BACKGROUND
Information security is a blend of
strategies that manages procedures, tools and
policies that are essential to detect, prevent,
document and encounter threats to information [1].
It is responsible to establish some business
processes that guards information assert regardless
of the format of the information or whether the
information is in storage, being processed or being
transmitted [2]. Information security has various
fields namely Internet of Things, Software defined
networking, Cloud Network and Wireless Sensor
Network.
I will first go deeper and scrutinize the IoT
which refers to a system of interconnected
computing devices both digital and analogue as
well as people under a platform with unique
identifiers and the ability of transmitting data over
a network without the need for human and
computer interaction.
II. INTRODUCTION
The rate at which devices are connected to
the internet is increasing every single day. That
brightens the growth of IoT and the advancement
of technology too. When similar devices are
connected online, hackers get an ease chance to
access them. The efforts by malicious hackers
interrupts confidentiality of Internet of Things and
also breaches security of those devices, crippling of
the infrastructure, loss of business and even
medical and healthy emergencies hence yielding
consequences of Internet of Things [3].
III. REAL WORLD EXAMPLE
Vehicle manufacturing industry is among
the top industry that is incorporating IoT on their
infrastructure. Car manufacturers are increasingly
coming up with models that have IoT systems
implanted on them; driverless cars are still
emerging out [4]. While the interconnection of
these cars and their car industry to internet is
growing fast, more drawbacks are anticipated.
After a test where two hackers did a
controlled experiment and they were able to
compromise a Jeep Cherokee, moving at a speed of
70kmh by turning the steering wheel and applying
breaks remotely. A threat not only to life but also to
the security of the property as the vehicle can even
be stolen when the driver is on the steering is posed
[5].
In this controlled test, two hackers
demonstrated how the radio and some other
unnecessary features of the Jeep could be run
remotely even before moving ahead to take control
of brakes, steering and even the engine from the
driver [5]. That means a car can be stolen even
when the driver is behind the wheel.
Internet of Things (IoT) Security: Real World Example, Solution and Conclusion_2

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Internet of Things (IoT) Security: Current Status, Challenges and Prospective Measures
|12
|760
|401

Assignment on Cyber Crime
|15
|4799
|77

Network Analysis Report: Security Issues, Vulnerabilities, and Solutions
|14
|2059
|356

Security and Privacy Issues in Internet of Things (IoT)
|5
|4679
|491

Internet of Things (IoT) Security
|9
|2735
|258

IT Connected Cars And Semi Autonomous
|4
|641
|22