logo

Information Technology Networking 2022

   

Added on  2022-08-22

6 Pages1887 Words13 Views
NETWORKING 1
Abstract
IoT is a part of information technology that helps to interconnect computers, networks, and machines easily and
provide data transmission facilities to the companies. It is capable to transfer data from one location to another and
monitor computing devices easily. Security is a problem associated with IoT networks due to which companies can
suffer from cyber-crimes and data breach concerns. This paper focusses on the security implications of IoT networks
and highlighted social, ethical and professional concerns linked to the IoT technology. It is found that misconfiguration
and unauthorized access both are major factors leading security threats in IoT networks and GDPR provides a way to
secure data of individuals in the workplace. So, it is suggested that companies should provide training to the members
and include firewall and encryption-based systems for securing data and managing cyber-crimes.
Keywords: IoT, security issues, firewall, encryption, and GDPR.
Introduction
IoT is a kind of system which is capable to interconnect computing networks, machines, devices and systems with each
other and able to transfer signals over computing networks without needing human-to-human communication. In this
modern generation, the uses of IoT networks are enhancing rapidly and many companies are moving towards IoT due
to their capability to enhance business performance and manage communication gaps (Frustaci, et al., 2017). Security
is a major concern linked with the IoT networks that negatively impact on the performance of computing devices and
personal data of the companies. The purpose of the investigation is to review the security implications of IoT networks
and highlight the effect of GDPR on data. This paper will include various points such as IoT protocols, the effect of
GDPR, ethical and social issues linked to IoT, appropriate security policies and many more.
Background
IoT is an effective technology that provides a way to perform data transmission over computing networks easily and
companies are adopting IoT based networks for performing business operations and managing communication-related
concerns. Khan and Salah, (2018) reported that IoT helps companies to enhance organizational performance but also
lead security threats as it includes wireless networks and systems which are less secured and can be hacked by
transferring malware signals.
(Source: Khan, and Salah, 2018)
Information Technology Networking 2022_1
NETWORKING 2
Figure: IoT networks
So, the utilization of IoT networks may impact on the privacy and lead security threats and cyber-crimes in the
companies and users may lose their sensitive information. This paper will help to examine risk factors leading security
issues in IoT networks and review the role of GDPR in the security of personal information. From recent literature, it is
found that IoT includes computing networks and communication channels where hackers transfer traffic signals and
reduce the confidentiality of data that produces data breach issues in the companies ( Mahmoud, et al., 2015).
Therefore, it is reported that the utilization of IoT networks can lead security threats in the companies but using
effective mitigation techniques and security policies highlighted by GDPR such issues can be managed easily.
The security implications of IoT devices
IoT protocols
Oh, and Kim, (2017) determined that the main current transport layer protocols used in the IoT networks are UDP and
TCP that help to perform operations and communicate effectively over networks. TCP is criticized as an IoT protocol
due to its larger effectiveness and reliability towards wireless communication. There are major four layers involve in
the TCP/IP stack including physical, network, transport, and application layer. The physical layer is an effective
TCP/IP layer that helps IoT networks to establish the interconnection channels in the business. The network layer helps
IoT systems to evaluate each computing device is linked to a similar router and unique numbers. Riahi, et al., (2014)
highlighted that 6LoWPAN is an effective network used in the IoT that helps to connect two or more computing
devices easily. The transport layer plays a significant character in IoT where consumers can control and address
unwanted signals and reduce cyber-attacks effectively. However, the application layer provides communication among
the consumer and the developed sensor applications. In the case of IoT MQTT, AMQP or CoAP protocols are used at
the application layer for performing data communication.
Source: Xu, Wendt, and Potkonjak, (2014)
Information Technology Networking 2022_2
NETWORKING 3
Figure: TCP/IP protocols for IoT
Legal implications and the effect of GDPR on data
Xiao, et al., (2018) determined that the advanced GDPR regulations holds an account of data protection plan
requirements and provide a way to secure data from the cyber-crimes. In this era, many companies are using GDPR
based regulations due to their potential to enhance cyber-security and protect data or sensitive information easily. The
passing of GDPR has directly affected data security and privacy standards and helps to manage risks that lead to data
breach activities in the workplace.
Source: Xu, Wendt, and Potkonjak, (2014)
Figure: Security issues in IoT
The cost of non-compliance is one that has encouraged communities to consider their data security responsibilities
inside the GDPR which is a major concern that can affect the performance of computing systems and produce hacking
issues. However, it is highlighted that the utilization of GDPR rules and regulations positively impact on the data and
help companies to manage the rate of cyber-crimes effectively.
Social, ethical and professional issues in IoT
IoT is the leading information technology which is now adopted in the society and business communities for managing
communication issues. Using IoT based networks individuals can perform tasks from any location but hackers and
government associations can obtain their data without taking their permission which can lead to social issues and
negatively impact on society. Xu, Wendt, and Potkonjak, (2014) determined that IoT includes wireless networks where
the hackers transfer malicious codes that can help to obtain login credentials and reduce the security of data.
Information Technology Networking 2022_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Leading Communication Technology
|5
|2088
|16

Security Issues Research Paper 2022
|5
|3360
|15

Security Issues In IoT
|12
|4945
|61

Cyber Security Article 2022
|5
|1172
|24

Research Proposal on Data Security in Regards to Smart Home Applications
|17
|3763
|18

Significance of IoT in Communication System and Importance of Big Data and Cloud Computing
|11
|3013
|282