logo

Security and Privacy Issues in Internet of Things

   

Added on  2023-06-14

8 Pages6754 Words320 Views
Security and Privacy Issues in Internet of Things
Name of the Student
Name of the University
Security and Privacy Issues in Internet of Things_1
ABSTRACT The Internet of things has been an ever-evolving process that has gained significance since the last decade. With
the increase in use of the technology the security issues of the technology has been the only instance of problem for this
platform. The internet engineer task force members have been trying to design an authentication and authorization mechanism
for the devices that use Internet of Things as a platform for their mode of operation. The main reason of concern regarding the
security of Internet of Things is that the attacks possessed on the Internet of Things platform affects the virtual as well as the
physical infrastructure.
1. Purpose of the report
This report will discuss about the main problem of
security that is mainly due to the fragmentation of the
platform that makes the platform less robust and
enables the cyber criminals to attack the platform and
gain personal data. Privacy protection of the
computing devices that uses Internet of Things
requires personal configuration security settings. This
report will provide literature review of the security
and privacy prospective of the platform and evaluate
the literature regarding the processes of overcoming
the loopholes that are present in the internet of
Things platform.
2. Topic:
Security and privacy in Internet of Things
3. Expect format of the report
The report will discuss about the security and
privacies terminology that must be maintained in order to
prevent the computing devices from being attacked by the
cyber criminals. The report presents a literature review of
topic related to the security and the maintenance of
privacy in the platform. The report discusses about the
steps that must be taken in order to keep the platform free
of cyber militants. The various methodologies are then
discussed that must be undertaken to keep the platform
protected.
4. Problem statement
Unauthorized personnel gain access to the personal data
of genuine clients. The privacy of the clients is at stake
due to the lack of robustness of the platform. The data of
a client is gained and the data is modulated in a format
that causes ill effect in the clients profile and the data is
modulated in order to harm the goodwill and status of the
client.
Introduction
Rapid development in the advancement in the
infrastructure of the hardware and software has been the major
reason behind the emergence of internet serving devices that
provides complete connectivity f the computing devices
(Alrawais, Alhothaily, & Cheng, 2017). The total number of
devices utilizing internet is expected to increase by a huge
number in the next 20 years (Oravec, 2017, July). With an
increase in growth of the Internet using devices the usage of
the platform of Internet of Things has increased to a great
extent. The emergence of internet of things has brought in
several advantages like that of increase in the connectivity
among the computers that are connected in the same
networking module (Li & Da Xu, 2017). With the advantage
of increased connectivity, the disadvantage of less robustness
of the platform comes in disguise. Despite the advantages, that
the Internet of Things the only aspect of concern of this
platform is the security of the platform. The aspect of data
being accessed by unauthorized personnel acts to be the major
threat. The challenges thrown by the cyber criminal on the
platform of Internet of Things can be dethroned by the
methodologies that are being used in daily basis. The security
aspect of the data base seems to be the major concern in
today’s world. The security problem regarding the social
networking comes in disguise with the advantages that are
been enjoyed due to the platform of Internet of things. These
challenges caused by the cyber criminals in the platform of the
Internet of things are both physical as well as virtual in nature.
The security problems that are physical in nature consist of the
hacks that include the hardware terminology and controlling
the hardware without proper authentication of the user. The
virtual hacks include gaining access to the personal portal of
an individual without proper authentication and modulating
the data in accord to harm the personnel. After performing
rigorous experiments regarding the aspect of security in the
field of Internet of things, procedures of facing these cyber
criminals have been found out with the help of the usage of
the platform of Internet of Things. After the advancement in
the process of retaining, the services of the security processes
in the field of Internet of Things the privacy of the users and
the clients are at a better security stature. This advancement in
the technology still yields loopholes that must be incarnated
by the service providers or the clients in order to stay
protected from the cyber criminals.
Structure of the report with the contents of the
report
The report will discuss about the approach that must be taken
in order to suggest the methodologies of the cyber criminals
that tend to access the data in n unauthorized manner. The
report will also discuss about understanding the supply chain
risk of the intruders that gain access to the data without having
any permit to the access data. This report will also discuss
about the acknowledging the cyber criminals have possessed
the address of the threat t hat in both virtual and physical
ways. This report will further discuss about the security
methodologies that must be followed by the clients in order to
keep the computing device free form any kind of cyber
crimes. This report will provide the literature review of the
functioning of the Network intrusion detection technique in
Security and Privacy Issues in Internet of Things_2
order to keep the computing device free from the cyber attacks
based on the platform of the Internet of things. This report will
also provide the literature review of the functionality of Host
Intrusion detection sensor s to keep the computing device free
from cyber attacks that will be based on the platform of the
Internet of Things (Ericsson, 2014). This report will ls provide
the literature review of the methodologies that are undertaken
in order to complete the process of cryptography and the
technicality that are involved in the completion of the process
of Honeypot in order to keep the computing device protected
from the cyber attacks. This report will also provide the
advantages and the disadvantages of the platform for the
security related to the platform of Internet of Things. This
report will also discuss about the future research scope of the
platform with respect to the platform of the Internet of Things.
Security and Privacy Issues in Internet of Things_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Security and Privacy Issues in Internet of Things
|5
|4067
|208

Threats to Internet of Things Devices
|18
|4722
|17

Impact of IoT on Cyber Security in Australia
|14
|3627
|98

Internet of Things (IoT) and ICT Assignment
|10
|1778
|230

Assignment on Cyber Crime
|15
|4799
|77

Cyber Security and IT Infrastructure: Challenges and Solutions
|4
|723
|396