logo

Network Security Issues

   

Added on  2023-01-17

9 Pages2037 Words42 Views
1
Running head: NETWORK SECURITY ISSUES
Network Security Issues
Student’s Name
School Affiliation

2
NETWORK SECURITY ISSUES
Table of Contents
Introduction......................................................................................................................................3
Security Issues.................................................................................................................................4
Attack Scenarios..............................................................................................................................6
Vulnerabilities..................................................................................................................................8
Solution............................................................................................................................................8
Conclusion.......................................................................................................................................8
References......................................................................................................................................10
Appendixes....................................................................................................................................11

3
NETWORK SECURITY ISSUES
Introduction
IoT refers to a framework of interrelated electronic gadgets, mechanical as well as digital
devices, objects, individuals which can be supplied with a unique identifiers as well as the
capability to exchange information over the network with no need for human to other human or
human beings to computer association. In the last few years, the idea of the internet of things has
drawn the attention of several individuals and it was initially introduced by Kevin Ashton. Due
to speedy improvements in mobile communication, Radio Frequency Identification, Wireless
sensor network as well as cloud computing amongst IoT gadgets have become more suitable
compared to the past. The gadgets used in IoT have a capacity of cooperating with each other,
and these devices are of different categories such as smartphones, laptops, personal computers,
tablets, PDA among other mobile embedded gadgets (Hossain, Fotouhi, & Hasan, 2015). The
IoT gadgets comprise of less effective sensors as well as wireless conversations systems to
converse with one another and move important data to the system which is centralized. The data
incoming from the IoT gadgets is then processed in that central system and then moved to the
targeted destinations. Due to the rapid advancement of communication as well as the technology
of the internet, our daily thinks and routines are narrowed on the fictional vacuum of the virtual
world. Individuals of capable of working, shopping and chatting, although human beings live in
the world which is real, thus, it is hard to replace whole human duties with the completely
automated living. There exists a boundary limit of the fictional vacuum that controls the future
advancement of the internet in order to better services.
The IoT has fruitfully introduced the fictional space as well as the real world on a similar
platform. The main focus of IoT is the setting of a suitable environment as well as self-conscious
independent gadgets like smart living, smart health, smart items as well as smart cities.

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
(pdf) Internet of things - IOT
|17
|6434
|71

The Main Concept of loT is Wireless Sensor Networks
|8
|1673
|42

Security Risks and Issues in IoT Technology
|7
|3094
|74

Internet of Things (IoT) Assignment Paper
|4
|764
|342

Internet of things - Assignment
|13
|4549
|42

Security Challenges in Emerging Networks Assignment
|4
|2314
|59