Discussing Security Vulnerabilities: An Analysis of Internet of Things

Verified

Added on  2023/04/21

|4
|663
|152
Essay
AI Summary
This essay provides an analysis of Internet of Things (IoT) security, drawing upon Bruce Schneier's book and focusing on the security challenges and vulnerabilities inherent in interconnected devices. It highlights scenarios discussed by Schneier, including the Jeep Cherokee hack, the Ukrainian power grid attack, and printer hacking incidents, to illustrate the potential risks. The essay further explores the reasons behind internet insecurity, such as poorly written software, unauthentic servers, and inadequate security measures. It also suggests measures to enhance security, including using advanced networks, authentic servers, strong passwords, and security tools like firewalls and encryption. The analysis aims to enhance understanding of cyber-crimes and improve internet security practices.
Document Page
Internet of thing
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
COMMUNICATING SECURITY
1
Part 1
Bruce Scheier described the main three scenarios in their book which are
completely based on the computer security and internet of thing. In the first scenario
the author discussed the case of two researchers that control a jeep Cherokee with the
help of the internet system and they are driving on a highway. Hackers enter into their
system and change the radio station, start the wipers and kill the engine which creates
an uncertainty in the system. In the second scenario, the author described the concept
of a crash over ride attack which targeted the prykarpattyaoblenergo control system, in
western Ukraine (Schneier, 2018). In the third scenario, Bruce described the case of
printers where hackers developed a program which detected common insecure printers
and hacked them. Next, the author also explained the fundamental concept of the
internet of thing and security related issues faced by the users.
There are many security issues arises from such circumstances for example,
hacking, data breach and malicious attack, computer crimes, phishing, jamming and
other vulnerabilities.
Part 2
Question 2
The Internet is one of the biggest communication platforms where consumers
can send and receive information from other. According to the Bruce security of
computer and internet is a very complex situation because many consumers use third
party applications and unauthentic networks which are developed by hackers. There
are many reasons why the internet is not secure for example; most software is poorly
written and insecure, use of unauthentic servers, lack of security tools, and many more.
Today, the rate of hacking is growing rapidly because the market does not provide
better quality software due to which hackers can easily enter into the user computer
system and block their personal files. Many consumers use the very simple password
based system as a security tool but it is not enough to address the cyber-crimes. They
also use the low level communication networks and protocols to share or receive data
due to which the problem of data breach and cyber-crimes are increasing (Schneier,
2018).
Document Page
COMMUNICATING SECURITY
2
Part 3
Question 8
According to Bruce the lack of security is one of the biggest issues faced by
consumers and it also increases the rate of cyber-attacks and data breaches. To control
and manage Bruce suggests that individuals can adopt the advanced computer
networks and systems and they can use only authentic servers during the
communication process by which internet can be secured. There are numerous third
party applications which are produced by the attackers and consumers use these
applications which can help hackers to access their accounts (Schneier, 2018). If they
use only configured and authentic networks then they can reduce the issue of a data
breach. The author also analysed that many users use simple passwords to secure their
systems that can be easily detected by attackers if they use strong password rather than
simple than they can improve the security of their data.
The assessment of this proposal is to identify the key factors that reduce security
of internet and enhance knowledge and skills in the field of cyber-crimes or hacking.
People should ensure that they block spam and fraud mails to improve security of the
internet connectivity. There are many other security tools and technologies such as
firewall, antivirus, encryption and decryption technique, cryptography technology,
robust technique to identify the spam and unwanted signals from the network. With the
help of all these approaches, the security of internet and computer system can be
enhanced.
Document Page
COMMUNICATING SECURITY
3
References
Schneier, B., (2018) Click Here to Kill Everybody: Security and Survival in a Hyper-
connected World.
chevron_up_icon
1 out of 4
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]