Internet of Things
Internet
of Things
Everyone
is becoming increasingly dependent on technology including cell phones,
tablets, desktops, laptops, watches, thermostats, doorbells, security cameras,
and any number of other devices able to send and receive data from the internet,
collectively these devices comprise the Internet of things (IoT). (Morgan) The
expansion of Broadband Internet coupled with more Wi-Fi capable devices has created
the “perfect storm” for IoT with some projections estimating that over 26
billion devices will be part of the IoT by 2020. (Morgan) Further the analyst
firm Gartner puts the number of devices closer to 100 billion including virtually
any device with an “on / off” switch. (Morgan)
The Impact of the IoT on Business IT
The
IoT brings the benefit of having everyone and virtually everything connected through
the internet with the daunting task of keeping this massive amount of
information, and internet access, safe and secure. The unprecedented reliance on computer systems
will created huge vulnerabilities and risk for businesses and business IT
systems. Continually changing systems,
increasing complexity and the sheer number of devices at risk will challenge
any IT department and when coupled with malicious malware (viruses, worms,
phishing, etc.) will present a need for robust and expensive firewalls and
other access restriction platforms. (Reynolds 88) Companies of all sizes will
be susceptible and when a weakness is found, could be targeted for things like information
mining. Recent examples of established
and successful companies that have been subject to similar attacks include Marriott,
Equifax, Adult Friend Finder, Anthem, Uber, eBay, JP Morgan Chase, Home Depot, and
Yahoo costing these companies millions of dollars and their customers’
priceless amounts of data (Armerding). Between 2014 and
2016 over 500 million people had personal information compromised in the recent Marriott data breach. (Gressin)
IoT Security Challenges
Device
authorization and authentication is likely to become a major issue (Gerber). Devices must establish their identity by
using device specific passwords. Unfortunately,
most of us are reluctant to use strong and complex passwords and prefer using easy to remember and familiar passwords or even device default passwords making
passwords a major point of failure in the IoT system. (Gerber) Second, the use
of inter-device communication platforms such as cloud services or commercial
applications will require additional scrutiny. (Gerber) Early IoT devices do
not encrypt data before sending or sharing with communication platforms. Using separate networks to isolate certain
devices will be necessary to reduce the likelihood of unwanted system
entry. And finally, ensuring high access
with limited down time will be extremely challenging for certain IoT services
including traffic control, healthcare, and other life essential services. (Gerber)
The cost to replace last generation equipment is very expensive and therefore
the challenge in front of the IT department will be to incorporate aging
technology with a single point of failure with the more sophisticated IoT
systems and security requirements.
Works Cited
Reynolds, George
Walter. Ethics in Information Technology. 5th ed., Cengage, 2019.
Armerding, Taylor. “The 18 Biggest Data Breaches of the 21st Century.” CSO
Online, CSO, 20 Dec. 2018,
www.csoonline.com/article/2130877/the-biggest-data-breaches-of-the-21st-century.html.
Whittaker, Zack. “Marriott Now Says 5 Million Unencrypted
Passport Numbers Were Stolen in Starwood Hotel Data Breach – TechCrunch.” TechCrunch, TechCrunch, 4 Jan. 2019, techcrunch.com/2019/01/04/marriott-five-million-passport-numbers-stolen-starwood/.
Gressin, Seena. “The Marriott Data Breach.” Consumer
Information, 4 Dec. 2018, www.consumer.ftc.gov/blog/2018/12/marriott-data-breach.
Morgan, Jacob. “A Simple Explanation Of 'The Internet Of
Things'.” Forbes, Forbes Magazine, 20 Apr. 2017, www.forbes.com/sites/jacobmorgan/2014/05/13/simple-explanation-internet-things-that-anyone-can-understand/#637c5fde1d09.
Gerber, Anna. “IoT Security Issues: Top 10 Challenges.” IBM
Developer,
developer.ibm.com/articles/iot-top-10-iot-security-challenges/.
I am very satisfied with your blog, good content are shared.
ReplyDeleteAccounting software Singapore
Accounting software
Psg grant accounting software
Nice blog, keep sharing with us.
ReplyDeleteIoT courses in Chennai
IoT Courses in Bangalore
The information you've provided is useful because it provides a wealth of knowledge that will be highly beneficial to me about traffic control person course Thank you for sharing that. Keep up the good work.
ReplyDeletevery informative content you have posted. this content share knowledge with us about outdoor camers and indoor camers too. 2E HALVE PRIJS! 2X I3 INDOOR CAM (ZWART) is cost-effective because they have mutliple features.
ReplyDeleteI liked your work and, as a result, the manner you presented this content about white label identity theft.It is a valuable paper for us. Thank you for sharing this blog with us.
ReplyDeleteClearly, It is an engaging blog for us which you have provided here about Dark Fiber Network Solutions Online This is a great resource to enhance knowledge about it. Thank you.
ReplyDeleteLove this article! Useful and informative. looking forward to seeing more like this. Also check this out Traffic Control Safety Training. Thank you.
ReplyDeleteThat's the 로스트아크 place you get $20 in freeplay on signup (no deposit required! to practice roulette on-line and spin the roulette wheel risk-free. That's the place you get £88 in freeplay on signup (no deposit required! to practice roulette on-line and spin the roulette wheel risk-free. The key to bettering your chances of profitable at roulette is to arrange the game the proper means and have every little thing prepared earlier than you play, not when you play.
ReplyDeleteIf at all feasible, send an SMS rather than making a call if you must use your home cell. Purchase an international SIM card; use your home mobile only if you are reachable, such as a businessperson. IoT SIM Card
ReplyDelete