Legal, Ethical, Social, Professional Challenges in IoT Hacking
VerifiedAdded on  2023/01/03
|6
|908
|90
Report
AI Summary
This report delves into the multifaceted challenges of ethical hacking within IoT-enabled protocols. It highlights the necessity of securing constrained devices, addressing authentication and authorization issues, and managing device updates. The report emphasizes the importance of securing communication channels, ensuring data privacy through anonymization and redaction, and safeguarding mobile, web, and cloud-based applications that interact with IoT data. Furthermore, it underscores the critical need to ensure high availability of IoT data and applications, mitigating potential disruptions like denial-of-service attacks. The analysis covers various aspects of IoT security, including encryption limitations, the use of two-factor authentication, and the implementation of multi-layered defense strategies, with references to relevant literature on ethical hacking and IoT security concerns.

Running head: ETHICAL HACKING IN IOT ENABLED PROTOCOLS
ETHICAL HACKING IN IOT ENABLED PROTOCOLS
Name of the student:
Name of the university:
Author Note:
ETHICAL HACKING IN IOT ENABLED PROTOCOLS
Name of the student:
Name of the university:
Author Note:
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

1ETHICAL HACKING IN IOT ENABLED PROTOCOLS
Table of Contents
Legal, Ethical, Social, Professional Challenges in Ethical hacking of IOT protocols...............2
Necessity to impart security to constrained devices (50).......................................................2
Authorization and authentication of devices (50)..................................................................2
Management of updates of the devices (50)..........................................................................2
Securing communication (50)................................................................................................3
Ensuring the privacy of the data (50).....................................................................................3
Securing mobile, web and cloud based applications (50)......................................................3
Ensuring high availability (50)...............................................................................................3
References..................................................................................................................................5
Table of Contents
Legal, Ethical, Social, Professional Challenges in Ethical hacking of IOT protocols...............2
Necessity to impart security to constrained devices (50).......................................................2
Authorization and authentication of devices (50)..................................................................2
Management of updates of the devices (50)..........................................................................2
Securing communication (50)................................................................................................3
Ensuring the privacy of the data (50).....................................................................................3
Securing mobile, web and cloud based applications (50)......................................................3
Ensuring high availability (50)...............................................................................................3
References..................................................................................................................................5

2ETHICAL HACKING IN IOT ENABLED PROTOCOLS
Legal, Ethical, Social, Professional Challenges in Ethical hacking of IOT
protocols
Necessity to impart security to constrained devices (50)
The encryption based security protocols are not suitable for the constrained IOT
enabled devices and applications (IBM Developer 2019). This owes to the incompetency of
these IOT enabled applications to successfully implement and execute complex encryption
and decryption (Christensen and Dannberg 2019). The vulnerabilities embedded within these
applications have exposed them to side channel attacks. The effectiveness of the
implementation of the IOT would successfully mitigate these vulnerabilities through the
incorporation of the multi-layer defense. This can be implemented through the segregation of
the devices into separate discrete networks.
Authorization and authentication of devices (50)
The authentication of the devices with a sole purpose of revealing their identity prior
to gaining access over the gateways is a prerequisite for the IOT enabled devices and
applications (IBM Developer 2019). The adoption of the IOT enabled platform renders
security to the applications and devices by facilitating the two-factor authentication (Ding, De
Jesus and Janssen 2019). IOT recommends the usage of robust certificates and potentially
strong passwords.
Management of updates of the devices (50)
The application of the updates essentially incorporates the security patches and
updating the software embedded on the IOT enabled devices, is accompanied by a number of
Legal, Ethical, Social, Professional Challenges in Ethical hacking of IOT
protocols
Necessity to impart security to constrained devices (50)
The encryption based security protocols are not suitable for the constrained IOT
enabled devices and applications (IBM Developer 2019). This owes to the incompetency of
these IOT enabled applications to successfully implement and execute complex encryption
and decryption (Christensen and Dannberg 2019). The vulnerabilities embedded within these
applications have exposed them to side channel attacks. The effectiveness of the
implementation of the IOT would successfully mitigate these vulnerabilities through the
incorporation of the multi-layer defense. This can be implemented through the segregation of
the devices into separate discrete networks.
Authorization and authentication of devices (50)
The authentication of the devices with a sole purpose of revealing their identity prior
to gaining access over the gateways is a prerequisite for the IOT enabled devices and
applications (IBM Developer 2019). The adoption of the IOT enabled platform renders
security to the applications and devices by facilitating the two-factor authentication (Ding, De
Jesus and Janssen 2019). IOT recommends the usage of robust certificates and potentially
strong passwords.
Management of updates of the devices (50)
The application of the updates essentially incorporates the security patches and
updating the software embedded on the IOT enabled devices, is accompanied by a number of
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

3ETHICAL HACKING IN IOT ENABLED PROTOCOLS
challenges (IBM Developer 2019). All the device specifications are not explicitly accustomed
to the coherent version of the available updates (Li et al 2018). The device management
critically monitors these updates and allocate the same for the applications and the devices.
Securing communication (50)
After securing the devices, the IoT secures the communication over the network
among the cloud service, application and devices (IBM Developer 2019). The IoT devices
never encrypt the messages of the sender before sending the messages over the network.. By
using the different networks in the isolated devices helps in establishing the privacy and
security of the communication in order to transmit the data confidentially.
Ensuring the privacy of the data (50)
Implementing the privacy of the data consists of the anonymizing or redacting the
confidential data before storing the data using decouple or data separation from the IoT data
payloads (IBM Developer 2019). If the information or the data is maintained, stored and
compliance with the legal frameworks, the confidential data should not be disposed, which is
the key challenge of ensuring the privacy of sensitive data.
Securing mobile, web and cloud based applications (50)
Cloud, mobile and web applications and the services are used for managing, process
and access the IoT data ad devices (IBM Developer 2019). They need to be secure as the part
of the multi-layered approach of the IoT security. While developing the IoT applications, it
needs to ensure te application of the secure practice for avoiding the risks. The application
should support the secure authentication by providing secure password and recovery options.
challenges (IBM Developer 2019). All the device specifications are not explicitly accustomed
to the coherent version of the available updates (Li et al 2018). The device management
critically monitors these updates and allocate the same for the applications and the devices.
Securing communication (50)
After securing the devices, the IoT secures the communication over the network
among the cloud service, application and devices (IBM Developer 2019). The IoT devices
never encrypt the messages of the sender before sending the messages over the network.. By
using the different networks in the isolated devices helps in establishing the privacy and
security of the communication in order to transmit the data confidentially.
Ensuring the privacy of the data (50)
Implementing the privacy of the data consists of the anonymizing or redacting the
confidential data before storing the data using decouple or data separation from the IoT data
payloads (IBM Developer 2019). If the information or the data is maintained, stored and
compliance with the legal frameworks, the confidential data should not be disposed, which is
the key challenge of ensuring the privacy of sensitive data.
Securing mobile, web and cloud based applications (50)
Cloud, mobile and web applications and the services are used for managing, process
and access the IoT data ad devices (IBM Developer 2019). They need to be secure as the part
of the multi-layered approach of the IoT security. While developing the IoT applications, it
needs to ensure te application of the secure practice for avoiding the risks. The application
should support the secure authentication by providing secure password and recovery options.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

4ETHICAL HACKING IN IOT ENABLED PROTOCOLS
Ensuring high availability (50)
The developers of IoT should consider the availability of the IoT data and mobile and
web applications, which relies on the IoT data (IBM Developer 2019). The potential for the
disruption result the device failure and the outages connectivity. It arises as the attacks such
as denial of the service attack, which is more inconvenience. That is why ensuring the high
availability of the IoT data is very essential.
Ensuring high availability (50)
The developers of IoT should consider the availability of the IoT data and mobile and
web applications, which relies on the IoT data (IBM Developer 2019). The potential for the
disruption result the device failure and the outages connectivity. It arises as the attacks such
as denial of the service attack, which is more inconvenience. That is why ensuring the high
availability of the IoT data is very essential.

5ETHICAL HACKING IN IOT ENABLED PROTOCOLS
References
Christensen, L. and Dannberg, D., 2019. Ethical hacking of IoT devices: OBD-II dongles.
Ding, A.Y., De Jesus, G.L. and Janssen, M., 2019. Ethical Hacking for IoT Security: A First
Look into Bug Bounty Programs and Responsible Disclosure. arXiv preprint
arXiv:1909.11166.
Li, L., Li, Z., Shahriar, H., Rutherfoord, R., Peltsverger, S. and Tatum, D., 2018. Ethical
Hacking: Network Security and Penetration Testing.
Top 10 IoT security challenges. IBM Developer. (2019). IoT Security Issues: Top 10
Challenges. [online] Available at: https://developer.ibm.com/articles/iot-top-10-iot-security-
challenges/ [Accessed 1 Oct. 2019].
References
Christensen, L. and Dannberg, D., 2019. Ethical hacking of IoT devices: OBD-II dongles.
Ding, A.Y., De Jesus, G.L. and Janssen, M., 2019. Ethical Hacking for IoT Security: A First
Look into Bug Bounty Programs and Responsible Disclosure. arXiv preprint
arXiv:1909.11166.
Li, L., Li, Z., Shahriar, H., Rutherfoord, R., Peltsverger, S. and Tatum, D., 2018. Ethical
Hacking: Network Security and Penetration Testing.
Top 10 IoT security challenges. IBM Developer. (2019). IoT Security Issues: Top 10
Challenges. [online] Available at: https://developer.ibm.com/articles/iot-top-10-iot-security-
challenges/ [Accessed 1 Oct. 2019].
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 6
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
 +13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.