Sign In
Not register? Register Now!
Pages:
2 pages/≈550 words
Sources:
4 Sources
Style:
APA
Subject:
Business & Marketing
Type:
Case Study
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 9.72
Topic:

Internet of Things-Based Threats

Case Study Instructions:

Using the articles and lecture materials provided in class as a jumping-off point, research IoT-based attacks further.
Based on your research, create a short paper detailing the following:
1. What kinds of IoT threats currently exist that we should be concerned about? (Select 2 or 3 at most that you think are critical)
2. Provide a real-world example of one of those IoT-based threats that actually took place - Tell me what happened and how it happened
3. Provide a set of solutions you think might help prevent similar attacks from happening again in the future.
Your paper should be between 2-3 pages double-spaced, include a title page and a bibliography that contains any references used to create your work, as well as professional in-text citations, spelling and grammar. Below i have attached the links for the lectures
https://www(dot)iotworldtoday(dot)com/2021/09/17/iot-cyberattacks-escalate-in-2021-according-to-kaspersky/
https://www(dot)crowdstrike(dot)com/cybersecurity-101/zero-trust-security/
https://www(dot)zdnet(dot)com/article/iot-under-attack-security-is-still-good-not-enough-on-these-edge-devices/

Case Study Sample Content Preview:

Question Answer
Student Name
Instructor Name
Institutional Affiliation
Course Number and Name
Due Date
Question Answer
Types of Threats IoT’s integration of the physical world and electronic devices exposes innovation to a multifaceted threat. This aspect allows for a range of threats from simple to complex forms. Moreover, the IoT systems retain most dangers often experienced in the other network form, albeit in customized contexts. One of the threat types is spoofing identity. IoT systems must be sophisticatedly constructed to facilitate efficient integration between the physical and the electronic worlds partly because players can easily model the physical world to allow false identification. Russell and Duren (2018) call this deceiving process spoofing. The second threat is repudiation which describes the infiltration of communication channels. The IoT system functions on the anticipation that the input data from the sensors accurately represents the physical world. This process occurs when the network paths become manipulated so that the registered data is not reflective of the states in the physical world (Russell & Duren, 2018). The third one is that the physical aspect of the IoT system necessitates physical security. As a result, physical security bypass is a real threat to IoT systems. In this case, evaluating the physical world requires the strategic deployment of material sensors to guarantee effectiveness. The security of these locations is thus imperative. Real-World Example Malicious attacks are often registered in IoT systems. However, the victim organizations confidentially withhold most of the intricacies of the attracts for security reasons. However, they comprehensively report the attacks of the white hackers who aim to improve the security of the systems. Russell and Duren (2018) indicate that enlisted researchers conduct many of the disclosed attacks on consumer IoT devices to better the system’s security (2018). One of the attacks that received significant traction was the hacking of the 2014 model of a Jeep Cherokee in 2015. Researchers Charlie Miller and Chris Valasek managed to attain complete remote control of the esteemed SUV car. The infiltration was achieved through the exploitation of the Controller Area Network (CAN) system that allows the automobiles to ...
Updated on
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

👀 Other Visitors are Viewing These APA Case Study Samples:

HIRE A WRITER FROM $11.95 / PAGE
ORDER WITH 15% DISCOUNT!