logo

Vulnerabilities with Internet of Things 0 Name STUDENT ID IT SECURITY Introduction IoT

   

Added on  2022-12-12

7 Pages1808 Words461 Views
IT SECURITY
0
NAME STUDENT ID
Vulnerabilities with Internet
of Things
Vulnerabilities with Internet of Things 0 Name STUDENT ID IT SECURITY Introduction IoT_1
IT SECURITY
Table of Contents
Introduction.................................................................................................................... 2
Content of the paper......................................................................................................... 2
Research methodologies used in paper...................................................................................3
Research strategy.......................................................................................................... 3
Research design........................................................................................................... 3
Data obtaining techniques............................................................................................... 3
Data analysis technique.................................................................................................. 4
Findings and results of the paper.......................................................................................... 4
Issues highlighted by the researchers..................................................................................... 4
Conclusion of the paper..................................................................................................... 4
Conclusion..................................................................................................................... 5
References..................................................................................................................... 6
1
NAME STUDENT ID
Vulnerabilities with Internet of Things 0 Name STUDENT ID IT SECURITY Introduction IoT_2
IT SECURITY
Introduction
IoT is an advanced computing technology that provides a way for connecting computing devices
with human things and lead performance of the computer networks. IoT has the potential to
handle interaction between the networks and connect numbers of devices with each other [1].
Security is a major issue linked with IoT technology that impact on the sensitive data of the
consumers. The purpose of this paper is to examine the susceptibilities and risks associated with
the internet of things. The selected paper for this study is “Vulnerabilities with the Internet of
Things" that was written by Kazi Zunnurhain [1]. This report will include several units, for
example, the content of the paper, research approaches and so on.
Content of the paper
In the selected paper, the researchers reviewed security issues and vulnerabilities linked to the
internet of things. It is observed that GPS mounted systems and automatic networks used in the
automotive industry which produce safety threats and vulnerabilities in the context of IoT
networks [2]. The authors examined that utilization of IoT enables devices in business
communities can lead data breach-related issues because it involves third party networks and
unauthentic access which help the hackers for performing malware activities. In this research
article, the authors also conducted a literature search which included the findings or outcomes of
the recent articles published on IoT networks.
There are various sectors where the consumers use IoT enables networks, for example,
automobile sectors, personal fitness apps, smart cities and others but the security of information
is a shared problem related with the IoT networks that effect the privacy of the computing
systems. In this journal article, the authors evaluated and analyzed the risk factors linked to the
IoT enable networks and identified the types of security attacks faced by the consumers [2]. It is
identified that lack of privacy and involvement of unauthentic networks in the computing
systems and IoT devices produce malware networks and data breach issues. The authors clearly
described and analyzed the vulnerabilities in numerous sectors and also identified the importance
of IoT in the companies.
2
NAME STUDENT ID
Vulnerabilities with Internet of Things 0 Name STUDENT ID IT SECURITY Introduction IoT_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Challenges of Internet of Things in Health care sector
|8
|1491
|206

Security Issues In IoT
|12
|4945
|61

IoT Security: Risks and Mitigation Techniques
|10
|865
|302

Security and Privacy Issues in IoT/Smart Architectures
|5
|3113
|303

IoT Threats to Database Security
|20
|1383
|296

Threats to Internet of Things Devices
|18
|4722
|17