Stevens Institute of Technolo

Write a minmum 750 word paper describing The Internet of Things (IoT)  and the advantages it provides and the security issues associated with this environment. 

The Internet of Things

(IoT) is a term used to define how software, hardware, and other emerging

technologies can transmit data from one device to another through the internet.

Over the recent years, IoT devices have been integrated into both business and

family life due to their increasing range of applications. These devices

include; fitness watches, google voice search, electric kettles, and Bluetooth

speakers – only to name a few.  One of

the reasons behind the increasing popularity of IoT devices is their ability to

access huge volumes of data at a go. The data can then be used to perform

functions like tailoring marketing adverts to specific audiences, or monitoring

driving to improve automobile designs. IoT devices also improve customer

inventory and stock taking like in cases where businesses use software to

monitor products and raw materials. With IoT devices like CCTVs, security is

also improved especially since a person can monitor their premises in

real-time. The purpose of this paper is to establish the

challenges various IoT devices pose to digital forensics. First, these

devices are highly prone to cyber-attacks which may severely affect the user

because the devices connect with other personal devices. These attacks may be

perpetrated through data breaches that may occur knowingly or unknowingly. It

becomes concerning whether the user will be able to protect their privacy while

connecting ten IoT devices that are part of their daily life together.  Another challenge facing IoT devices is the overcrowding

of networks which is being remedied by 5G. The research

produced in this paper promoted the discovery of the privacy and security

vulnerabilities associated with these IoT devices and the specific areas

solutions should target to mitigate risks. 

Another Challenge that affects the IoT environment is the overcrowding of networks but that is solved by the 5G network, “IoT connect billions of objects for high-speed data transfer especially in the 5G-enabled industrial environment during information collection and processing” (Mistry et al. 2020).  In regards to the same, it is hard for a user to protect their privacy while connecting different IoT devices which they use daily. Most probably the device sync and it is not good. According to Das & Gunduz 2018; “it is no surprise that many recent cyber-attacks are IoT-enabled: the attacker initially exploits some vulnerable IoT technology as a first step toward compromising a critical system that is connected, in some way, with the IoT.”

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized

Stevens Institute of Technolo

Part 1: Answer each these questions in a paragraph with at least five sentences: Include the question and number your responses accordingly. Provide a citation for each answer.

1. Should society help workers dislocated when technology, like the Internet, elimlnates their jobs in a process called ‘Creative Destruction‘?

2. are we working more and earning less?

3. Would you want a telecommuting job? Why or why not?

4. Does the gig economy appeal to you? Why or why not?

5. How is an employee differentiated from a contracter under US law?

6. Why have some municipalities put restrictions on innovations in the sharing economy and in on-demand services?

7. What has been the effect on the US economy of outsourcing (or offshoring) technical and professional jobs?

8. How much monitoring of employee activities at work is appropriate?

9. Should an employer be able to discipline or terminate an employee for on-line behavior in his/her own time?

10. What is the relationship betwee BYOD (bring your own device) and shadow IT.

11. What is cyberloafing?

Part 2: Complete your answers in 3-4 sentences. Include the question and number your responses accordingly. Provide a citation for each answer.

10.1 What are three broad mechanisms that malware can use to propagate?

10.2 What are four broad categories of payloads that malware may carry?

10.3 What are typical phases of operation of a virus or worm?

10.4 What mechanisms can a virus use to conceal itself?

10.5 What is the difference between machine-executable and macro viruses?

10.6 What means can a worm use to access remote systems to propagate?

10.7 What is a “drive-by-download” and how does it differ from a worm?

10.8 What is a “logic bomb”?

10.9 Differentiate among the following: a backdoor, a bot, a keylogger, spyware, and a rootkit? Can they all be present in the same malware?

10.10 List some of the different levels in a system that a rootkit may use.

10.11 Describe some malware countermeasure elements.

10.12 List three places malware mitigation mechanisms may be located.

10.13 Briefly describe the four generations of antivirus software.

10.14 How does behavior-blocking software work?

10.15 What is a distributed denial-of-service system?

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized