logo

Security Issues in IoT and IT Infrastructure

Apply understanding and knowledge gained from weekly content to analyze network security issues, develop mitigation strategies, and evaluate vulnerabilities in a contemporary network.

18 Pages4683 Words229 Views
   

Added on  2022-11-24

About This Document

This investigation aims to identify the security risks and threats associated with the IoT technology and evaluate the prevention strategies and techniques for addressing such kinds of issues. It covers security issues related to IoT and IT infrastructure, real examples of security attacks, vulnerabilities, and proposed solutions.

Security Issues in IoT and IT Infrastructure

Apply understanding and knowledge gained from weekly content to analyze network security issues, develop mitigation strategies, and evaluate vulnerabilities in a contemporary network.

   Added on 2022-11-24

ShareRelated Documents
NETWORK SECURITY 0
Internet of Things
Security Issues in IoT and IT Infrastructure_1
NETWORK SECURITY 1
Table of Contents
Introduction.....................................................................................................2
Security issues................................................................................................2
Security issues linked with IoT....................................................................3
IoT malware and ransomware...................................................................3
DDOS attack..............................................................................................4
Security issues linked with IT infrastructure...............................................5
Unauthentic networks...............................................................................5
Phishing attack..........................................................................................6
Attack scenario................................................................................................6
Vulnerabilities.................................................................................................9
Unsecured endpoints...................................................................................9
SQL injections (SQLi).................................................................................10
Proposed solutions........................................................................................10
Utilization of authentic networks...............................................................10
Develop security policies............................................................................11
Follow proper configuration process.........................................................11
Utilization of secured software..................................................................11
Adopt encryption techniques.....................................................................12
Use backup plans.......................................................................................12
Use risk assessment plans.........................................................................12
Conclusion.....................................................................................................13
References.....................................................................................................14
Security Issues in IoT and IT Infrastructure_2
NETWORK SECURITY 2
Security Issues in IoT and IT Infrastructure_3
NETWORK SECURITY 3
Introduction
The IoT is an innovation which is used to connect computing devices,
networks and sensors with physical things. It has the potential to send data
or signals over a network without using any human to human
communication by whcih it can be used in long-distance announcement
(Abomhara, & Køien, 2014). As an external cyber security consultant, it is
very significant to classify the risk factors related to the IoT which impact
on the organizational performance. This investigation aims to identify the
security risks and threats associated with the IoT technology and evaluate
the prevention strategies and techniques for addressing such kinds of
issues. It is observed that DDOS is a common security attack faced by the
companies that impact on the overall performance of both IoT and IT
infrastructure used by the companies. There are numerous sections will be
included in this investigation for example, security issues related to the IoT
and IT infrastructure, a real example of security attacks, vulnerability
occurred in the companies and prevention techniques.
Security issues
IoT is one of the reliable technologies which are now used in business
companies to enhance the productivity of their services. It is observed that
IoT based devices do not require any connecting cables because it uses the
fundamental concept of wireless networks by which users can exchange
signals from one place to another. The major problem associated with the
IoT based system is security where the hackers send the traffic signals and
reduce the performance of networks that also impact on the organizational
performance (Balte, Kashid, & Patil, 2015). It is analyzed that there are
major two risk factors that increase the rate of security threats and risks in
IoT enabled devices, for example, utilization of unauthorized networks and
lack of proper communication between the developed networks and servers.
Security Issues in IoT and IT Infrastructure_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Information Systems Security: IT Security Fundamentals, Vulnerabilities, and IBM Security Architecture
|5
|747
|57

Security Issues In IoT
|12
|4945
|61

Identification of Security Issues in a Network
|12
|3102
|67

IoT Security: Risks and Mitigation Techniques
|10
|865
|302

Vulnerabilities with Internet of Things 0 Name STUDENT ID IT SECURITY Introduction IoT
|7
|1808
|461

Leading Communication Technology
|5
|2088
|16