The information age which has been brought up by the internet has a lot of impacts on our lives. Internet of things interconnects smart devices and sensors using IP address technology and machine to machine connectivity. Due to this connectivity, there has been rising concern over the internet security issues. The internet of things provides a platform which when accessed gives personal information which can be used to harm an individual. The security issues lead to interference with the operations and due to personal information causes loss of life. The three main security issues which should be addressed by al technologies are confidentiality, integrity, and availability of information. The confidentiality aspect in the internet of things is by ensuring that people access the information which they are only allowed to. Confidentiality ensures that private information such as those dealing with health information, employment information and credit information spread over the internet. The integrity aspect ensures that information held on the internet is valid and accurate. Security concerns over integrity ensure that the information held in the databases are accurate and there is no altering or deletion of such information. Availability concern ensures that the system provides the information to authorized users instantly. Denial of service is an attack which is commonly concerned with hindering access of information by authorized users.
One of the security problem associated with the internet is the wide availability of information on the e-business platform. E-business platforms provide fast and effective communication between suppliers and buyers. The effective and easy delivery of products and services have led to the high number of users. Due to this number the security problem of availing sensitive transaction information to hackers and cooperate espionage. The issue, therefore, brings a significant threat to an environment which provides varied business and transactional information
Increased data access is another problem of the internet environment. Unlike the traditional organizational policies, it is difficult to come up with policies which govern the access of information by users over the internet. Also, the users using the internet are not well known by the organization, unlike the traditional setup which employees are well known by the manager. Due to this access of information by a varied number of users company information and transactional information are accessed by users who are not well known.
Authorizing and authenticating devices is another security issue associated with the internet of things. Many devices fail in the internet of things because of weak passwords used which lead to failure in device authentication. Managing device updates is also a challenge when it comes to the internet of things. Some devices fail to update the system because of technological obsolesce which pose a challenge for old devices used in the network. To solve the issue of authentication, the two-factor approach can be used to manage the generation of passwords to ensure the production of strong passwords for the devices. Device manager systems can be used to help devices in the internet of things system to enable the machines only to update the necessary updates and also gives roll back and push forward technique to continue updates. Secure socket protocol can be used to ensure that reliable communication occurs between two identified devices in the network to provide security and availability of information. Security electronic transaction is a system which can be used by e-business platforms to manage payments over the internet.
Reference
Zhou, J., Cao, Z., Dong, X., & Vasilakos, A. V. (2017). Security and privacy for cloud-based IoT: challenges. IEEE Communications Magazine, 55(1), 26-33.
Cite this page
Internet of Things Security Issues Essay Example. (2022, Sep 05). Retrieved from https://proessays.net/essays/internet-of-things-security-issues-essay-example
If you are the original author of this essay and no longer wish to have it published on the ProEssays website, please click below to request its removal:
- Digital Diplomacy Essay
- Patient's Data at Texas Health Resource Essay
- Ethical and Legal Issues While Designing and Managing an Enterprise Network
- Vulnerability of the Information Systems to Attacks - Research Paper
- Essay Sample on Employee Perceptions of New Tech: Key to Effective Cybersecurity
- Chinese Room Experiment: AI, Computers, and Human Intelligence - Essay Sample
- Essay on Microsoft: Innovative Strategies for Software Progress & Consumer Satisfaction