Cyber Security in the Age of IoT: Comprehensive Report and Analysis

Verified

Added on  2022/10/13

|14
|3518
|36
Report
AI Summary
This report provides a comprehensive overview of cyber security in the context of the Internet of Things (IoT). It begins with an introduction to IoT, explaining its core concept as a network of interconnected computing devices that exchange data. The report then delves into various applications of IoT, including smart homes, wearable technology, smart cities, industrial internet, connected cars, smart farming, and retail. It also explores the network protocols that enable IoT communication, such as Constrained Application Protocol (CoAP), Message Queue Telemetry Transport (MQTT), and Advanced Message Queuing Protocol (AMQP). The report highlights how IoT improves lives by enhancing communication, automating tasks, and enabling smart solutions in various sectors. Furthermore, it addresses the security threats associated with IoT, underscoring the importance of robust security measures to protect connected devices and data. Overall, the report offers a valuable resource for understanding the current state and future implications of cyber security within the rapidly evolving landscape of the Internet of Things.
Document Page
RUNNING HEAD: CYBER SECURITY 0
Cyber Security
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
CYBER SECURITY 1
Table of Contents
Introduction................................................................................................................................2
Internet of Things.......................................................................................................................2
Applications of Internet of Things.............................................................................................3
Network Protocols......................................................................................................................5
Improving Lives through Internet of Things..............................................................................5
Security Threats.........................................................................................................................5
Conclusions................................................................................................................................5
Document Page
CYBER SECURITY 2
Introduction
Internet of things is a system of interrelated computing devices that consists of unique
identification and is able to transfer data from computers to human interactions. The
involvement is due to the convergence of multiple technologies, commodity sensors, and all
its embedded systems. In the consumer market, it is one of the synonymous to the products
about the concept of Smartphone via all the devices associated with the ecosystem.
The introduction of the concept enters with smart devices earlier in 1982 with the
modification of vending machines and it has become the first internet-connected appliances.
Kevin Ashton introduces the term of the Internet for things and internet connection is a
wonderful thing as it provides many benefits with the upgraded technology (Rosencrance,
Shea, & Wigmore, 2019).
Internet of thing matters as it can send and receive information quickly. The
definition is simply the point of time where objects or more things connect to internet rather
than people. Various technologies support the networking functions, which need in an IOT
system that is contrasting to the standard of a uniform network in the common systems
(Kovacs, 2019).
The different applications of the internet of things plays an important role and
network protocols design in such a way that helps to grow technology. The report structured
the framework of a system in interrelated computing devices with digital machines to connect
with the Internet of Things. The report also focuses on security threats that are available and
directly associate with the technology.
Document Page
CYBER SECURITY 3
Internet of Things
According to nutshell, it is the concept of connecting with smart devices through
Internet. It is a giant network of a connection with collection of data and how they used in
effective surrounding environment. It has evolved as a convergence of wireless technologies
and micro services systems. Ashton is the first person who introduces and mentions the
internet of things with the idea to connect many devices since the year 1970, under the
pervasive computing software (Srivastava, 2019).
The first appliances, which are discovered is the coke machine at a famous university
in the 1980s with the use of web programs that assist in status of machines. The major
benefit of the internet of things is to monitor the overall business process, save time, integrate
all business models.
Generate more revenues and improve the customer experience is the focus of IOT. It
encourages more companies to rethink the ideas and ways in guiding their business, markets
to access the tools to improve strategies of the business. It provides ability to access
information with the help of connections at any time on any devices (Clark, 2019).
Internet of things improved communication with electronic devices and transfer data
packets over connected devices. Internet of things automates a task that increases the actual
quality of business and reduces major interventions of the human being. Various internets of
thing standards and frameworks uses in a UNIX like operating system and serves as a smart
device in development of platforms.
Data distribution service is being developed with the internet of things standard for
real-time that guides high performances in achieving communications. AMPQ is open-source
that helps in the standard of not existing messages by wire. The introduction of long-range
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
CYBER SECURITY 4
wide area network is the biggest protocol in networks that is designed to support in smart
cities and millions of low power devices (Sciforce, 2019).
Internet of things built-in sensor system and these mostly connected to internet that
diversifies the data to different devices. Internet of things is an ecosystem that comprises of
sensors that talk to the cloud through the main source of connectivity. The process starts with
feeding the data in cloud then it transforms the data in a software process that decides to
perform actions without the need of the user.
For example, the Smartphone is devices that had more than end number of sensors that
are active like GPS or camera, the actual work is to respond with their things that we need as
it does not respond and sense to the things. The step always comes with a pick and collects
data from the actual surrounding environment in the multiple devices (McClelland, 2019).
It works as hardware with billions of connected devices, which attaches with actuators
and control the physical world. There is a security system, which closely connects to
privacy and liability. It built at every step of the designing system.
There is an embed program in all the IoT devices and prototyped in commoditized
microcontroller platforms in printed circuit boards at a later stage. Network design is
an essential system in internet of things as these are connected devices such as sheer
volume due to the impact in designing the network at every scale.
Developers need securely sand stores to query the vast quantities of heterogeneous
data that originates from all the devices. Networking and cloud integration connect to
enable the devices in applications that are running in the cloud.
As when we see cloud computing and IOT are both different technologies that stream
the real-time data and integration of cloud in the proper functioning of IOT.
Document Page
CYBER SECURITY 5
Applications of IOT
Internet of things has many applications, which extends into commercial, consumer,
and infrastructural spaces. The growing portion with the devices creates with the use of
consumer-connected vehicles, wearable technology and many more. The important
applications that relates to the internet of things are mention below (Gour, 2019).
Smart Phones is the most efficient application which stands out every time are smart
home as the highest IOT application on all common channels. The number of people searches
for smart phones increases from time to time and it is the most important things via Internet.
The database of Smartphone for Internet of things analyses more in companies where there is
use of more networking. There is an estimated amount of findings’ for start-ups and this
exceeds 2.5 billion with growing rapid rates (Lueth, 2019).
Consumers wear these, as this looks smart when wearing on any occasions. Apple and
Mi smart watches are the latest trend in 2015, as there is huge number of wearable
innovations to be excited. The wearable maker is Jawbone and one of the biggest funding in
these types of wearable products. A smart watch reflects personality with speed and these
people always play positive health benefits in their day-to-day life.
The smart city widens a wider variety of cases from water distributions, traffic
management, and monitoring of the environment. It is popular with fact that the smart city
has various solutions that promise to the real pains of people living in cities. IOT solutions
act as a smart city as it solves traffic congestion problems and helps a safer environment
(Triantafyllou, Sarigiannidis, & Lagkas, 2019).
There is use of information with the other behaviour of consumers in an automated
fashion to grow as efficiency and be more reliable. More than 41000 numbers of user’s use
these features in Google searches that highlight the concept of popularity.
Document Page
CYBER SECURITY 6
Moreover, at the same time in twitter, it uses as more in a month and it shows people
do not have more to say in it. The industrial internet is one of special internets of things
applications as this is used by famous market researchers like Cisco and Gartner as the IOT
concept with the popularity of achieving the highest potential (Johnson, 2019).
The industrial internet has a lot which gets the biggest push of people on social
platforms with the comparison to other non-consumer oriented concepts. Connected Car is a
vast and extensive use of network technology as embedded software’s, multiple sensors,
antennas that guide in communication to navigate in the complex environment.
It is most reliable and people are responsible for making more decisions with
consistency. There is a list of start-ups that need innovations in a company to adapt the IOT
system in their structures and name of such companies are Nest, multinational corporations
like Belkin, Philips or Haier (Lueth, 2019).
Retailers already start with adopting IOT solutions and embed the system across the
number of applications that use to improve inventory management, increases purchases,
improve store operations and enhance the experience of consumer shopping. Smart farming
looked like a business model for internet of things, as it is not well-known categories such as
industrial and flexibility. With remoteness of operations in farming, these all the data
monitors with internet of things in the way farmers look for work (Lee, 2019).
Network Protocols
Network protocol may define as conventions for the communication between
perceived devices and network. It includes mechanisms for current devices to identify and
make connections with formatting rules and then received messages. The modern protocol
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
CYBER SECURITY 7
that grows in supporting a message designed for reliable network communications in the
system.
Various network protocols designed for the internet of things is constrained
application protocol that guides the internet utility protocol for all the gadgets, which are
constraints. This protocol mainly used in the machine-to-machine communications that are
based on HTTP protocols (Mitchell, 2019).
The second protocol’s that is specially designed is message queue telemetry transport
protocol and it normally uses in faraway tracking in the internet of things. The primary
challenge is with gathering characteristics with delivery of its infrastructure and gadgets.
These protocols have three foremost activities that are design for a publisher, dealer, and a
subscriber (Internet of Things Protocols, 2019).
Advanced message queuing protocol is also a layered protocol with message-oriented
middleware environment that supports verbal exchange through transport warranty
primitives. This enables the patron programs to engage with the AMQP model. There is a
chain of services that starts with the exchange, message queue and binding of protocols (Jain
& Salman, 2019).
The data distribution system is the internet of things protocol that has fundamental
layers and the range of platforms supports green bandwidth with addictive systems. It is real-
time, scalable, and interoperable statistics with submitted techniques. Therefore, these all are
some of the protocols that formulates specially for IOT network protocols.
Improving Lives through Internet of Things
Internet of things directly or indirectly affects our lives as use of devices on regular
basis connects us with people in just seconds. These cell phones, electronic appliances, and
Document Page
CYBER SECURITY 8
vehicles connect to a wireless network. It helps us to identify what is best and how much time
it will took to response in a faster way. The use of sensors and the responding activity
depends upon how effectively we use internet of things in our lives.
The sensor collects the data and with the help of software, it uploads all the data to
cloud with other connected device. With the help of sensor, it become easier as analytics
became faster, better and users are able to rely on analytics to make better choices and
decisions. The collection of data and upload is a method of knowing the connectivity, which
formulates the entire structure.
As more people in smart cities connects through internet of things and technology to
create sustainable infrastructures to comply with all the resources like local economy, traffic
flow as this increase quality life of residents. It reduces traffic congestions as connecting with
internet will let us know about traffic accident that already happened in other places. Smart
parking’s enables to reduce the actual timing to drive and fuel while look for parking space
during rush areas (Gasiorowski, 2019).
Internet of things helps to manage the flow of work in a systematic way that directly
and indirectly influences our lives in a positive way. The results are more convenient to find
the best solutions related to upgraded technologies. The sensor system operates the functions
with use of effective way in managing best solutions to all providers. Internet of things uses
optimised solution in conveying faster message and reduces lack of disturbances in between.
Early morning system makes our lives so easier as smart phones enables us to woke
up on perfect time, reducing accidents, occur of storms can be informed via use of
Smartphone and police can be informed at the same timings. A city light reduces energy
consumptions when no one is present in the surrounding environment.
Document Page
CYBER SECURITY 9
Healthcare will improve us with the use of latest technology as it collects data to
make sense with more doctors to track vital statistics of their patients. Many hospitals use
smart beds to perform with latest and upgraded technology for their patients. Renewable
energy continues to grow with its devices to turn on with the green sources to stay powered.
The direct impact on consumers results in corporate business models with the cost of
incrementing that links with system and people (Kranz, 2019).
The traditional manufacturing industry is marked as a dawn of smart technologies,
which is depending on internet of things with the safe and sustainable environment. The
dramatic improvements with the project to cost reduction and production generate billions in
all over productivity over the next few years.
Thanks to IOT, it makes us realise that we can watch soccer and matches with our
smart devices wherever possible. Fans may be able to get goodies in the form of smart
clothes that allow player to feel great. Even on the pitch, sensors and sport people clothes
give supporters to increase their concentration on performances (Kangath, 2019).
Security Threats
Computer and internet applications connectivity helps to grow with time from so
many years. Many security threats that prevail in our day-to-day devices are used and this
makes technology world more vulnerable. There is lack of updates and this is faced by most
of the companies that are churning these devices related to security risks and issues. The
evolution of technology comes with the introduction of smart appliances and smart home
system in IoT (Merella, 2019).
Some of the IOT devices turned email servers for mass spam and that can be used as
botnets for the conduction of distributed denial of services attacks. The unsafe
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
CYBER SECURITY 10
communication is the biggest threat as devices do not encrypt the messages when the sender
had dome message over prescribed networks (Smith, 2019).
Company’s needs to ensure real communication to cloud services when encrypted.
Isolating devices use of different networks creates private communication with
confidentiality. The security threats play a vital role in accessing the requirement and there
are many people who can trust and response in positive way. The use of the default password
is also the threats, which are faced by most of the companies. Weak credentials leave are
connected to IOT devices prone to password hackings (IoT Security Threats, 2019).
The use of unsafe credentials is putting both their customers at business risk that
infect through brute force attempt. There is lack of remote access and leak of personal
information that turns the microphones on without the presence of owners. With the use of
more devices, more threats come along with the same and this is the downside of having an
increase boost in IOT devices (Hasan, 2019). Therefore, these all are some of the security
threats that are associated with technology.
Conclusions
The report concludes with the conclusion on the topic of Internet of things
technology. The introduction tells about what is IOT all about and how does it work in the
surrounding environment. There are various applications, which help to guide and learned
practices in accessing the best network system. It connects us in day-to-day life operations
and we can benefit from the same in less time. The report tells about the nature and practices
of IOT and what is formulates our thinking to choose best options.
Network protocols are formal standards and procedures, which define
communication between two devices, and there are many network protocols, which
Document Page
CYBER SECURITY 11
formulates especially for IOT. Internet of things helps and influence in changing our life as
when we used internet things to develop the system. The report also focuses on security
threats that are associated with the technology in internet of things.
Bibliography
chevron_up_icon
1 out of 14
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]