Network Systems and Administrative Discussion 2022
VerifiedAdded on 2022/09/21
|10
|2421
|23
AI Summary
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: NETWORK SYSTEMS AND ADMINISTRATIVE
Network systems and administrative
Name of the student:
Name of the university:
Author Note
Network systems and administrative
Name of the student:
Name of the university:
Author Note
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1NETWORK SYSTEMS AND ADMINISTRATIVE
Executive summary
The Internet of Everything of IoE is the latest emerging trend, particularly for the homes. Here, the
marketing homes have been moving towards the smart home and accelerating with the spreading of
such system in the households. At this place, the obvious danger of the quick adoption of the gadgets
is that most of them have been lacking controls to protect security and privacy of the end-users from
the attacks that are designed for disrupting the lives along with incurring economic losses. In the
following report, a literature review has been done, keeping the security of IoE in mind.
Executive summary
The Internet of Everything of IoE is the latest emerging trend, particularly for the homes. Here, the
marketing homes have been moving towards the smart home and accelerating with the spreading of
such system in the households. At this place, the obvious danger of the quick adoption of the gadgets
is that most of them have been lacking controls to protect security and privacy of the end-users from
the attacks that are designed for disrupting the lives along with incurring economic losses. In the
following report, a literature review has been done, keeping the security of IoE in mind.
2NETWORK SYSTEMS AND ADMINISTRATIVE
Table of Contents
Introduction:..........................................................................................................................................3
Discussion of various risks with IoE:....................................................................................................3
Possible attacks on IoE and some suggestions:.....................................................................................5
Conclusion:............................................................................................................................................6
References:............................................................................................................................................8
Table of Contents
Introduction:..........................................................................................................................................3
Discussion of various risks with IoE:....................................................................................................3
Possible attacks on IoE and some suggestions:.....................................................................................5
Conclusion:............................................................................................................................................6
References:............................................................................................................................................8
3NETWORK SYSTEMS AND ADMINISTRATIVE
Introduction:
The IoE or Internet of Everything is a wide term indicating consumer products and devices
like to the internet. This is outfitted with broad digital technologies. This is a kind of philosophy
where the future of technology has been comprised of various kinds of devices, items and appliances
that are linked to the Internet throughout the world. It has been lying on the future ideas and internet
connections are never limited to desktop or laptop computers along with some tablets similar to
previous times. Rather than this systems are commonly smarter through having much more access to
data with expanded opportunities of networking. In the following study, various pieces of literature
are studies to understand the security of the Internet of Everything.
Discussion of various risks with IoE:
Ahmed, Ullah and Pathan (2020) demonstrate the microphones and cameras. For this, the
products in the house that have a microphone and camera can be considered [1]. For instance,
smartphones, computers and also toys, videogame consoles and TVs can be considered. Hence, it is
vital to remain aware of the in-home and private conversations that might never be private. It is
unfortunate, the sophisticated next-door attackers, on the other end, might hack the home network.
As that occurs, they must access the connected system along with compromising the information.
Hossain (2020) suggests that in that case, the home router must be secured along with the wireless
network. One must never look for the easiest and quickest method to get the home router to be
working [2]. Rather than that, time must be taken to enable the security like firewall rues, strong
passwords and using encryption. For this, the devices are to be turned off and unplugged.
Microphones must be disabled as one have any sort of private conversation. Apart from that, the
Introduction:
The IoE or Internet of Everything is a wide term indicating consumer products and devices
like to the internet. This is outfitted with broad digital technologies. This is a kind of philosophy
where the future of technology has been comprised of various kinds of devices, items and appliances
that are linked to the Internet throughout the world. It has been lying on the future ideas and internet
connections are never limited to desktop or laptop computers along with some tablets similar to
previous times. Rather than this systems are commonly smarter through having much more access to
data with expanded opportunities of networking. In the following study, various pieces of literature
are studies to understand the security of the Internet of Everything.
Discussion of various risks with IoE:
Ahmed, Ullah and Pathan (2020) demonstrate the microphones and cameras. For this, the
products in the house that have a microphone and camera can be considered [1]. For instance,
smartphones, computers and also toys, videogame consoles and TVs can be considered. Hence, it is
vital to remain aware of the in-home and private conversations that might never be private. It is
unfortunate, the sophisticated next-door attackers, on the other end, might hack the home network.
As that occurs, they must access the connected system along with compromising the information.
Hossain (2020) suggests that in that case, the home router must be secured along with the wireless
network. One must never look for the easiest and quickest method to get the home router to be
working [2]. Rather than that, time must be taken to enable the security like firewall rues, strong
passwords and using encryption. For this, the devices are to be turned off and unplugged.
Microphones must be disabled as one have any sort of private conversation. Apart from that, the
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
4NETWORK SYSTEMS AND ADMINISTRATIVE
camera must be covered or should be turned away as one never intend to be seen as per Shojafar and
Sookhak (2020) [11].
Next, Yang (2019) discusses home appliances. Other people over the Internet a personal
access systems connected to the home networks and any kind of wireless networks present in the
range [3]. However, it is hopeful the last IoT devices can be manufactured with a primary level of
security controls in a proper place for restricting the access. Nonetheless, one can never assume that
there can be any sort of built-in security. The reason is that the IoT devices that also include the
home appliances can have similar and no more amount of energy constraints and bandwidth that are
faced by every appliances and device. This restricts the quantity of security that must be built-in.
Inherently, the software is insecure here, as discussed by Shojafar and Sookhak (2020) [12]. Here,
the latest malware variants are generated at an alarming rate of about one million every day. This is
well under the cause of expecting that home appliances are linked to the Internet having minimum
vulnerable to various cyber-attacks as the systems are today at present. This is also complicated to
patch the devices since they commonly run the embedded firmware that is never simple to be
upgraded or be maintained. This would also be more complicated to patch the devices since they
commonly run the embedded firmware that is smiling to maintain or update. Then, Yang (219)
analyzes the case of automobiles [3]. The cars have been linked to the Internet as they are a terrific
method of helping to be safe. The car can detect any sudden type of rolling of the ball of the child
and implement brakes prior they can see the child be running into the street. Nonetheless, as revealed
by the article. This is possible for manual controls in cars to get overridden from few miles apart
from the driver. Here, among the other elements that could be performed the radio remotely must be
turned on along with air conditioning and also control steering. Having the sobering news, it must be
remembered that the car features of test driverless of auto manufacturers are the place where hackers
might see the latest opportunities to steal and control cars from distant places. Further, Lu et al.
camera must be covered or should be turned away as one never intend to be seen as per Shojafar and
Sookhak (2020) [11].
Next, Yang (2019) discusses home appliances. Other people over the Internet a personal
access systems connected to the home networks and any kind of wireless networks present in the
range [3]. However, it is hopeful the last IoT devices can be manufactured with a primary level of
security controls in a proper place for restricting the access. Nonetheless, one can never assume that
there can be any sort of built-in security. The reason is that the IoT devices that also include the
home appliances can have similar and no more amount of energy constraints and bandwidth that are
faced by every appliances and device. This restricts the quantity of security that must be built-in.
Inherently, the software is insecure here, as discussed by Shojafar and Sookhak (2020) [12]. Here,
the latest malware variants are generated at an alarming rate of about one million every day. This is
well under the cause of expecting that home appliances are linked to the Internet having minimum
vulnerable to various cyber-attacks as the systems are today at present. This is also complicated to
patch the devices since they commonly run the embedded firmware that is never simple to be
upgraded or be maintained. This would also be more complicated to patch the devices since they
commonly run the embedded firmware that is smiling to maintain or update. Then, Yang (219)
analyzes the case of automobiles [3]. The cars have been linked to the Internet as they are a terrific
method of helping to be safe. The car can detect any sudden type of rolling of the ball of the child
and implement brakes prior they can see the child be running into the street. Nonetheless, as revealed
by the article. This is possible for manual controls in cars to get overridden from few miles apart
from the driver. Here, among the other elements that could be performed the radio remotely must be
turned on along with air conditioning and also control steering. Having the sobering news, it must be
remembered that the car features of test driverless of auto manufacturers are the place where hackers
might see the latest opportunities to steal and control cars from distant places. Further, Lu et al.
5NETWORK SYSTEMS AND ADMINISTRATIVE
(2019) explain about medical devices [4]. Countless lives have been saved daily through the
technologies that are connected through the Internet enabling prior detection of various maladies and
heart conditions. Suitable needs of the security requirements to get designed to the medical devices
that have been vulnerable to the malware and various other cyberattacks. There has been a cost-
benefit assessment that is needed to be made in all type of decisions. As IoE is considered, it is vital
for consumers to totally be aware of challenges prior to purchase is made. This marketing teams that
are well-funded of huge corporations generate the devices that are connected through the Internet.
Thus one can see an understandable focus on the advantages of the devices sold by them. This is on
consumes to look at the problems and then understand the ways to control them.
Possible attacks on IoE and some suggestions:
According to Garzia and Papi (2016), IoE has been seen to be ushering in the exciting time of
the rise in innovation, mobility and convenience [6]. Various smart devices of the present
marketplace have been revolutionary in nature and providing a glimpse to the collective future.
Nonetheless, with the rise in ease and the connectivity, the less privacy comes into play. More the
devices collect and then transfer the personal information, more scopes are there for the
cybercriminals in intercepting that and then sue that for criminal purposes. This is the reason every
one requires to stay aware of the problem along with totally prepared to perform that part of
migrating them. Moreover, Kim (2019) demonstrates various risks [7]. Firstly, there is the snuffer
attack. It includes the program named as “sniffer”. This brings out the unencrypted information that
has been passing across the network and steals that. Then, there is the denial of service attack. Here,
the cybercriminals have been using that kind of attacks for preventing or then slowing down using
specific networks and devices. Then the compromised key attack is to be performed. Here, the key to
encrypted communication has been stolen. It must be used for interpreting encrypted data. Further,
(2019) explain about medical devices [4]. Countless lives have been saved daily through the
technologies that are connected through the Internet enabling prior detection of various maladies and
heart conditions. Suitable needs of the security requirements to get designed to the medical devices
that have been vulnerable to the malware and various other cyberattacks. There has been a cost-
benefit assessment that is needed to be made in all type of decisions. As IoE is considered, it is vital
for consumers to totally be aware of challenges prior to purchase is made. This marketing teams that
are well-funded of huge corporations generate the devices that are connected through the Internet.
Thus one can see an understandable focus on the advantages of the devices sold by them. This is on
consumes to look at the problems and then understand the ways to control them.
Possible attacks on IoE and some suggestions:
According to Garzia and Papi (2016), IoE has been seen to be ushering in the exciting time of
the rise in innovation, mobility and convenience [6]. Various smart devices of the present
marketplace have been revolutionary in nature and providing a glimpse to the collective future.
Nonetheless, with the rise in ease and the connectivity, the less privacy comes into play. More the
devices collect and then transfer the personal information, more scopes are there for the
cybercriminals in intercepting that and then sue that for criminal purposes. This is the reason every
one requires to stay aware of the problem along with totally prepared to perform that part of
migrating them. Moreover, Kim (2019) demonstrates various risks [7]. Firstly, there is the snuffer
attack. It includes the program named as “sniffer”. This brings out the unencrypted information that
has been passing across the network and steals that. Then, there is the denial of service attack. Here,
the cybercriminals have been using that kind of attacks for preventing or then slowing down using
specific networks and devices. Then the compromised key attack is to be performed. Here, the key to
encrypted communication has been stolen. It must be used for interpreting encrypted data. Further,
6NETWORK SYSTEMS AND ADMINISTRATIVE
there is a password-based attack. Here, the cybercriminals must be using that attack to break inside
the network and system to a particular network through stealing or guessing the password.
Moreover, the man-in-the-middle attack must be considered. Here, any third party is seen to be
stealing the data transmitted between the devices and parties.
As per Comer (2018), some of the recommendations are discussed hereafter. Every security
features are to be enabled on every smart device [8]. It has been provided by manufacturers to assure
the security and it is largely proposed to use them. IoE enabled products are to be bought from
various vendors updating the product firmware on a regular basis. The vulnerabilities and flaws are
inherent in any type of system and products from vendors have been rolling out regularly from
firmware updates for patching to be more secure. Moreover, researches must be done to see that the
smart device is able to promptly encrypt the updates of firmware and communication of network as
per Snyder and Byrd (2017) [9]. Though any smart system might be able to totally advertise the
encryption usages, few might never deploy the encryption fully or properly. It must be also be
assured the device model is well searched over the Google for probable historical security problems.
Moreover, secure passwords are to be used. It must be reminded that effective passwords must have
the complicated combination of various alphanumeric characters like mathematical symbols,
punctuation marks, numbers and letters. Lastly, the way manufacturers find out the device problems
are also to be found out, as explained by Cao et al. (2017) [10].
Conclusion:
IoE has been essentially a rising trend to connect the daily objects to the Internet. The
devices include everything from various mobile phones, thermostats, home entertainment systems,
automobiles, refrigerators, coffee machines, wearable devices and mobile phones. There are various
advantages to have the items linked to the Internet like the inventory to the refrigerator prior to
there is a password-based attack. Here, the cybercriminals must be using that attack to break inside
the network and system to a particular network through stealing or guessing the password.
Moreover, the man-in-the-middle attack must be considered. Here, any third party is seen to be
stealing the data transmitted between the devices and parties.
As per Comer (2018), some of the recommendations are discussed hereafter. Every security
features are to be enabled on every smart device [8]. It has been provided by manufacturers to assure
the security and it is largely proposed to use them. IoE enabled products are to be bought from
various vendors updating the product firmware on a regular basis. The vulnerabilities and flaws are
inherent in any type of system and products from vendors have been rolling out regularly from
firmware updates for patching to be more secure. Moreover, researches must be done to see that the
smart device is able to promptly encrypt the updates of firmware and communication of network as
per Snyder and Byrd (2017) [9]. Though any smart system might be able to totally advertise the
encryption usages, few might never deploy the encryption fully or properly. It must be also be
assured the device model is well searched over the Google for probable historical security problems.
Moreover, secure passwords are to be used. It must be reminded that effective passwords must have
the complicated combination of various alphanumeric characters like mathematical symbols,
punctuation marks, numbers and letters. Lastly, the way manufacturers find out the device problems
are also to be found out, as explained by Cao et al. (2017) [10].
Conclusion:
IoE has been essentially a rising trend to connect the daily objects to the Internet. The
devices include everything from various mobile phones, thermostats, home entertainment systems,
automobiles, refrigerators, coffee machines, wearable devices and mobile phones. There are various
advantages to have the items linked to the Internet like the inventory to the refrigerator prior to
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
7NETWORK SYSTEMS AND ADMINISTRATIVE
leaving the work and turn on oven prior one get home. Security and privacy concerns are there that
must be considered by the consumers. This is vital to know when the items at home have been
connected online and they are accessible to the overall world of uses that are Internet-connected.
Thus the data they collect turns to be valuable. The ushers are under exciting age of the rise of
innovation, mobility and convenience. At present most of the smart devices are revolutionary in
nature and offering a glimpse to the collective future. Nonetheless, with the rise in connectivity and
ease less privacy must be considered. More the devices collect and transfer the personal information,
more scopes are there for the cybercriminals to intercept that and utilize that for criminal purposes.
This is the reason people must be aware of problems and then totally prepared for doing their role to
eradicate them.
leaving the work and turn on oven prior one get home. Security and privacy concerns are there that
must be considered by the consumers. This is vital to know when the items at home have been
connected online and they are accessible to the overall world of uses that are Internet-connected.
Thus the data they collect turns to be valuable. The ushers are under exciting age of the rise of
innovation, mobility and convenience. At present most of the smart devices are revolutionary in
nature and offering a glimpse to the collective future. Nonetheless, with the rise in connectivity and
ease less privacy must be considered. More the devices collect and transfer the personal information,
more scopes are there for the cybercriminals to intercept that and utilize that for criminal purposes.
This is the reason people must be aware of problems and then totally prepared for doing their role to
eradicate them.
8NETWORK SYSTEMS AND ADMINISTRATIVE
References:
[1] Ahmed, M., Ullah, A.S.B. and Pathan, A.S.K. eds., 2020. Security Analytics for the Internet of
Everything. CRC Press.
[2] Hossain, B. (2020). Critical Analysis of Blockchain for Internet of Everything. In Security
Analytics for the Internet of Everything (pp. 3-28). CRC Press.
[3] Yang, W.H., Chiu, S.W., Kuo, C.C., Lin, Y.T., Lai, Y.J., Chen, H.W., Ma, Y.S., Chen, K.H., Lin,
Y.H., Lin, S.R. and Tsai, T.Y., 2019. A True-Random-Number-Based Pseudohysteresis Controller
for Buck DC–DC Converter in High-Security Internet-of-Everything Devices. IEEE Transactions
on Power Electronics, 35(3), pp.2969-2978.
[4] Yang, W.H., Chu, L.C., Yang, S.H., Lai, Y.J., Chen, S.Q., Chen, K.H., Lin, Y.H., Lin, S.R. and
Tsai, T.Y., 2018, February. An enhanced-security buck DC-DC converter with true-random-number-
based pseudo hysteresis controller for Internet-of-Everything (IoE) devices. In 2018 IEEE
International Solid-State Circuits Conference-(ISSCC) (pp. 126-128). IEEE.
[5] Lu, H., Su, S., Tian, Z. and Zhu, C., 2019. A novel search engine for Internet of Everything
based on dynamic prediction. China Communications, 16(3), pp.42-52.
[6] Garzia, F. and Papi, L., 2016, October. An Internet of Everything based integrated security
system for smart archaeological areas. In 2016 IEEE International Carnahan Conference on
Security Technology (ICCST) (pp. 1-8). IEEE.
[7] Kim, J., 2019. Nano-intrinsic security primitives for internet of everything.
[8] Comer, D.E., 2018. The Internet book: everything you need to know about computer networking
and how the Internet works. CRC Press.
References:
[1] Ahmed, M., Ullah, A.S.B. and Pathan, A.S.K. eds., 2020. Security Analytics for the Internet of
Everything. CRC Press.
[2] Hossain, B. (2020). Critical Analysis of Blockchain for Internet of Everything. In Security
Analytics for the Internet of Everything (pp. 3-28). CRC Press.
[3] Yang, W.H., Chiu, S.W., Kuo, C.C., Lin, Y.T., Lai, Y.J., Chen, H.W., Ma, Y.S., Chen, K.H., Lin,
Y.H., Lin, S.R. and Tsai, T.Y., 2019. A True-Random-Number-Based Pseudohysteresis Controller
for Buck DC–DC Converter in High-Security Internet-of-Everything Devices. IEEE Transactions
on Power Electronics, 35(3), pp.2969-2978.
[4] Yang, W.H., Chu, L.C., Yang, S.H., Lai, Y.J., Chen, S.Q., Chen, K.H., Lin, Y.H., Lin, S.R. and
Tsai, T.Y., 2018, February. An enhanced-security buck DC-DC converter with true-random-number-
based pseudo hysteresis controller for Internet-of-Everything (IoE) devices. In 2018 IEEE
International Solid-State Circuits Conference-(ISSCC) (pp. 126-128). IEEE.
[5] Lu, H., Su, S., Tian, Z. and Zhu, C., 2019. A novel search engine for Internet of Everything
based on dynamic prediction. China Communications, 16(3), pp.42-52.
[6] Garzia, F. and Papi, L., 2016, October. An Internet of Everything based integrated security
system for smart archaeological areas. In 2016 IEEE International Carnahan Conference on
Security Technology (ICCST) (pp. 1-8). IEEE.
[7] Kim, J., 2019. Nano-intrinsic security primitives for internet of everything.
[8] Comer, D.E., 2018. The Internet book: everything you need to know about computer networking
and how the Internet works. CRC Press.
9NETWORK SYSTEMS AND ADMINISTRATIVE
[9] Snyder, T. and Byrd, G., 2017. The Internet of everything. Computer, (6), pp.8-9.
[10] Cao, J., Xu, L., Abdallah, R. and Shi, W., 2017, June. EdgeOS_H: A home operating system for
Internet of everything. In 2017 IEEE 37th international conference on distributed computing
systems (ICDCS) (pp. 1756-1764). IEEE.
[11] Shojafar, M. and Sookhak, M., 2020. Internet of everything, networks, applications, and
computing systems (IoENACS).
[12] Dawson, M., 2020. Exploring Secure Computing for the Internet of Things, Internet of
Everything, Web of Things, and Hyperconnectivity. In Securing the Internet of Things: Concepts,
Methodologies, Tools, and Applications (pp. 1186-1195). IGI Global.
[9] Snyder, T. and Byrd, G., 2017. The Internet of everything. Computer, (6), pp.8-9.
[10] Cao, J., Xu, L., Abdallah, R. and Shi, W., 2017, June. EdgeOS_H: A home operating system for
Internet of everything. In 2017 IEEE 37th international conference on distributed computing
systems (ICDCS) (pp. 1756-1764). IEEE.
[11] Shojafar, M. and Sookhak, M., 2020. Internet of everything, networks, applications, and
computing systems (IoENACS).
[12] Dawson, M., 2020. Exploring Secure Computing for the Internet of Things, Internet of
Everything, Web of Things, and Hyperconnectivity. In Securing the Internet of Things: Concepts,
Methodologies, Tools, and Applications (pp. 1186-1195). IGI Global.
1 out of 10
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.