logo

Security and Privacy Risks in IoT Technology

8 Pages2122 Words323 Views
   

Added on  2023-06-03

About This Document

This report discusses the security and privacy risks associated with IoT technology. It covers topics such as data integrity, breach of private data, protecting data from corporations, limited encryption capabilities, handling privacy issues, and managing security updates.

Security and Privacy Risks in IoT Technology

   Added on 2023-06-03

ShareRelated Documents
Advance Topic in ICT
Security and Privacy are the principles of society most at risk with the internet of things? Do you
agree?
Security and Privacy Risks in IoT Technology_1
Table of Contents
Introduction............................................................................................................................. 2
Internet of Things (IoT).............................................................................................................2
Security and Privacy risks relating to IoT Technology...............................................................3
Conclusion................................................................................................................................ 5
References................................................................................................................................6
Page 1
Security and Privacy Risks in IoT Technology_2
Introduction
With the advancement of technology, the role of information and communication
technology (ICT) has increased substantially in the lives of people across the globe.
Individuals rely on services such as social media sites, smartphones, and others to perform
their daily operations. The popularity of the internet of things (IoT) technology is growing
substantially worldwide. A large number of corporations manufactures the smart wearable
and smart home appliance, and these devices are available across the globe. The devices
enable users to continuously stay connected and communicate with other devices without
any difficulty (Gubbi et al., 2013). The IoT devices collect private data of users in order to
work properly; however, this raised various security and privacy concerns (Ziegeldorf,
Morchon, and Wehrle, 2014). Along with the popularity of IoT devices, the privacy attacks
on the personal data of users have increased substantially. It has become easier for cyber
criminals to collect the sensitive data of users through different IoT devices. This report will
focus on providing various arguments to support the statement that ‘security and privacy
are the principles of society most at risk with the internet of things’.
Internet of Things (IoT)
The IoT technology is referred to a system of interrelated computer devices, mechanical,
digital machines, objective, and others with unique identifiers (UIDs). These devices have
the ability to transfer data over a network with each other without the requirement of a
human-to-human or human-to-computer interaction (Lee and Lee, 2015). Based on this
interaction, the devices collect information and learn about the private data of the user
which enable them to provide seamless services to the clients. There is a wide range of IoT
devices which are produced by corporations across the globe which are used for
commercial, infrastructure, industrial and consumer spaces. Some examples of IoT devices
include smart home appliances, smart watch, smart cars, smart home hubs, and others. In
2018, there are more than 7 billion IoT devices produced by companies across the globe.
This number is to be expected to reach 21.5 billion by 2025 (Lueth, 2018). It shows that IoT
technology has the potential to affect a large number of people across the globe.
Page 2
Security and Privacy Risks in IoT Technology_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Is Security and Risk Management Information 2022
|12
|2651
|15

Assignment on Cyber Crime
|15
|4799
|77

Ethics and Professional Practice
|9
|3014
|150

Internet of Things: Risks, Opportunities, and Ethical Responsibilities
|14
|3636
|453

Technology Review for managing or exploiting IoT Data
|6
|2126
|21

Smart Connected Home Architecture, Threats and Countermeasures.
|17
|4151
|17