Screenshot (33).png Screenshot (34).png Screenshot (35).png

1 answer below »
I have to do about topic 2 because my student id ends with 6.


Screenshot (33).png Screenshot (34).png Screenshot (35).png
Answered 2 days AfterSep 02, 2021

Answer To: Screenshot (33).png Screenshot (34).png Screenshot (35).png

Neha answered on Sep 05 2021
144 Votes
Internet of Things
The Internet of Things has multiple advantages and most of the people are using it in their organization to achieve love new technologies. The Internet of Things has privacy which has special consideration and it is required to protect the information about any individual from its exposure in the IoT environment. In this environment every logical or physical entity can be prov
ided a unique identifier and it has the ability to communicate anonymously over the Internet (Aqeel-ur-Rehman, S.U.R., Khan, I.U., Moiz, M. and Hasan, S).
As the different things present in the IoT environment are able to transfer the data autonomously then they also work pot of gold as the conjunction with some other endpoints and they are able to communicate with them. The interoperability of the things is very important for the functioning of IoT so that all the elements which are present in the network can work together. The data which is transferred by these endpoints can create the privacy issues on their own. When we are collecting, correlating and analysing the data collected from different endpoints then it can yield some sensitive information.
The basic idea of having the networking add work at young science and other objects check is new and have the global connectivity and data transfer in autonomous manner are the central for Internet of Things. The security cannot be considered in the network design and the household objects can be considered as the most vulnerable points. There are many researchers who found double iti in the WiFi enabled light world which allowed them to send request for the WiFi credentials and those credentials can be utilised to get the network access.
The Internet of Things is known for connecting devices and it is increasing the connection between devices every day. There have been 64 billion devices which are connected with the help of IoT. This growth has different benefits as it is able to change the manner in which people are carrying out their everyday tasks and it has potential to transform the world.
It is very cool to have a smart home, but the smart lighting is able to reduce the overall energy consumption and also reduce the electric bill. There are many new developments which allow us to stay connected with the cars and link up it with the smart city infrastructure so that it can create the entirely different ecosystem for the drivers who are currently using the traditional manner to reach our destination from the source. It has also used the healthcare devices to stay connected and it is helping people to have a complete and deeper look at their own health.
But all these benefits are creating new risks for us. As there is increase in the number of connected devices it is also providing new options to the cyber criminals and hacker to enter into the network. If we talk about the recent time, then there was a group of hackers which were able to take down the power grid in the western Ukraine and it created the first blackout from the cyber-attack. It was just the beginning as these hackers were trying more manners in which they were able to strike the critical infrastructure like chemical plants, power grids, hydroelectric dams and many others. There are different security issues, and the average consumer is concerned about the privacy.
IoT Privacy Issues
· The most common issue is precise of data. The IoT devices are known for generating a large amount of data which is present online. As per the report provided by a Federal Trade Commission which is titled as the Internet of Things: privacy and security in the connected world shows that there are less than 10 thousand households which are able to generate 150 million data points every day. It is able to create more entry points for the hackers and even leaves the sensitive information more vulnerable.
· There are many unwanted public profile/ it is no doubt that we have already agreed to the terms of services at...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here