IoT Security and Vulnerabilities-IT-423

IoT Security and Vulnerabilities-IT-423

IoT Security and Vulnerabilities-Need to add something to your grocery list? Want to listen to your favorite song or see who is knocking at your door while you are taking a shower? You can do all of these by simply asking one of the various IoT devices many of us have welcomed into our homes. As stated in the Shapiro Library article Internet of Things in the Vanguard but Vulnerable to Hacks, “IoT is quickly touching every facet of daily life and it’s becoming bigger and bigger business” (Fanelli, 2019). Should we be concerned with trading convenience for confidentiality? The article goes on to describe service attacks and various ways hackers have gained access to not just our information, but in some cases our homes.

For your initial post:

  • Consider the confidentiality, availability, and integrity (CIA) triad mentioned in the module resources.
  • Then determine whether you believe that the manufacturers of these IoT devices should be responsible for ensuring the security of their devices or that consumers are responsible for taking appropriate actions to protect themselves?
  • Support your choice by describing the measures either the manufacturer or consumer should take and how those measures would ensure confidentiality, privacy, or security.

In your responses to your peers:

  • State why you either agree or disagree with the responsible party chosen in the initial post and provide at least one additional safety measure that could be taken.

References

Fanelli, G. (2019). Internet of things in the vanguard but vulnerable to hacks. Rochester Business Journal, 34(46), 12. Retrieved from https://ezproxy.snhu.edu/login?qurl=https%3A%2F%2Fsearch.proquest.com%2Fdocview%2F2188850312%3Facc

To complete this assignment, review the Discussion Rubric.

Answer Preview-IoT Security and Vulnerabilities-IT-423 

IoT Security and Vulnerabilities-IT-423 

$3.00

Posted

in

by

Tags: