Thursday, December 5, 2019

Manipulate People Confidential Information -Myassignmenthelp.Com

Question: Discuss About The Manipulate People Confidential Information? Answer: Introduction Internet of Things refers to a system of interrelated computing devices that are connected through the internet [1]. This is done by using sensors which enable the devices get stimulated by something in their environment or from another device. The device will then react by performing another action after the stimulus is detected or received. Literature A security breach is an incident that results in unauthorized access of data, applications, services, networks or devices by bypassing their underlying security mechanisms. This occurs when an application, individual or device accesses a confidential, private or unauthorized logical perimeter [2]. Therefore, a security breach is like digital trespassing. For Internet of Things a security breach can be on a sensor, the network as a whole or just a device. By attacking any part of the system, one can elicit actions that are different from what should happen. There are different types of attacks that one can launch on a system. The major attacks on IoT are: Denial of service where the network is made unable to perform its usual tasks by being flooded by spam requests, social engineering which involves manipulating people to give up confidential information, data and identity theft, man-in-the-middle attack where an attacker intercepts communication between two systems and botnets which are a group of systems that are combined for remotely taking control and distributing malware [3]. Business Case A pair of security researchers demonstrated at a Black hat hacker conference in 2015 how to hack a wirelessly connected sniper rifle from a company by the name TrackPoint. The device allowed attackers to exploit the vulnerabilities remotely or when connected to the network by logging into its network which had a default password. Once logged in, one had administrative access to the device. This could enable one to completely disable the device or even change its targets. Analysis The security breach in this case is due to the weak password set for the device. In this case a default password is used. As long as someone has that password or can guess the password and they are within the devices range they are able to control the device. To solve this issue, the company needs to create random default login details for one time use on each of the devices as they are manufactured. The credentials should then be changed by the user after they are deployed. This will make it difficult for one to guess the credentials and log into the devices API. Conclusion Security is an issue that should always be thought about since a system is never truly secure. It is always only a matter of time before a vulnerability is discovered. However, when creating or manufacturing a digital device, it is always good to test it to ensure it passes the basic and most common security tests References A. Meola, "What is the Internet of Things (IoT)?," 19 December 2016. [Online]. Available: https://www.businessinsider.com/what-is-the-internet-of-things-definition-2016-8?IR=T. [Accessed 1 February 2018]. Techpedia, "Security Breach," 2018. [Online]. Available: https://www.techopedia.com/definition/29060/security-breach. [Accessed 1 February 2018]. L. Toms, "5 Common Cyber Attacks in the IoT - Threat Alert on a Grand Scale," 29 April 2016. [Online]. Available: https://www.globalsign.com/en/blog/five-common-cyber-attacks-in-the-iot/. [Accessed 1 February 2018].

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.