Task IoT security is concerned with safeguarding connected devices and networks in the Internet of things (IoT) environment .Research the issue of IoT security and write a report documenting your...

1 answer below »
TaskIoT security is concerned with safeguarding connected devices and networks in the Internet of things (IoT) environment.Research the issue of

IoT security

and write a report documenting your findings. Your report should include the following:- Introduction- Background- Security challenges posed by IoT- Protection mechanisms- Conclusions and future trendsWord limit:
Between 2000 to 3000 words.


Referencing

All sources of information must be appropriately referenced using the APA style ( http://student.csu.edu.au/library/integrity/referencing-at-csu )

Rationale

This assessment aims at partially achieving the following objectives:


- be able to explain fundamental information security concepts;
- be able to discuss and debate some of the security implications of computer networks, including cryptography;
- be able to communicate factors that relate to host and data security including vulnerabilities and patches and data protection mechanisms;
- be able to explain and debate issues and concepts related to management of ICT security including security planning and policy development.



Answered Same DayDec 26, 2021

Answer To: Task IoT security is concerned with safeguarding connected devices and networks in the Internet of...

Robert answered on Dec 26 2021
120 Votes
[DOCUMENT TITLE]
[Document subtitle]


[DATE]
[COMPANY NAME]
[Company address]
Table of Contents
Introduction ..................................................................................................................................... 2
Background: The Issues / Challenges ............................................................................................. 4
Protection Mechani
sm: IoT vulnerability management .................................................................. 5
Identifying, implementing security controls ............................................................................... 6
Secure design .............................................................................................................................. 6
Conclusions ..................................................................................................................................... 7
Introduction
The IoT (Internet of Things) is the technology by which different inter communication or
networking devices like vehicles, devices or also known as smart devices communicate with
each other that are embedded with a smart device or electronic chip with various sensors and
memory blocks that enables devices to exchange data and collect as well for analysis and
research. The Global Standard Initiative defined IoT as “the infrastructure of information
society”. The IoT enables the different objects to sense and control the remote devices on the
existing networks and they together create an opportunity for devices to be integrated into
systems that can communicate with each other and enhance overall efficiency of the entire
system. This enables accuracy of the data collected, the data collected is inter-related and under
real -time situations enabling the people to research data obtained from such sources with the
added advantage of reduced human interaction and intervention. When IoT is using the sensors
and actuators the situation becomes more generic way of cyber-physical systems like virtual
power plants, intelligent systems, smart home and cities etc. each of the such device is uniquely
identifiable through the embedded code and chip in the system but they are able to inter-
communicate and able to work over the existing infrastructures. With the estimation of 30 billion
units by the experts till the end of 2020, the IoT is the next big thing that will hit the market and
internet, actually it already has.
The main issue with the IoT related security is that it is quite new and security is generally not
being considered as the main aspect in any of the product design. The IoT based products are
generally sold outdated or vulnerable systems that are not even patched till date imbedded in
them. Another issue being the customer not changing the default passwords ever, this is like
opening invitation to the hackers or malicious users to hack the devices. Even if the passwords
are changed the passwords are so weak that a simple hack would be easily bypass it. In order to
improve the security on the IoT devices that the device needs to be accessible over the internet
should always be segmented to the local network and should not have access beyond it without
proper credentials. The network segment then can be monitored easily in order to identify traffic
and proper investigation and actions should be taken if any anomaly occurs on the network.
Security experts around the world have warned the manufacturers of large number of security
threats that loom over the IoT based devices and how the unsecured devices possessed a privacy
issues for the customers. In 2013 December, the research firm of security Proofpoint discovered
a botnet for IoT. This botnet was the network segment that comprises of more than 25% of IoT
based devices that include the smart TVs, baby monitors and other household devices.
Background: The Issues / Challenges
As per CASAGRAS the IoT is defined or understood as “a global network infrastructure, linking
physical and virtual objects through the exploitation of data capture and...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here