Cybersecurity Threats Posed By The Internet Of Things.

0 / 5. 0

Cybersecurity threats posed by the Internet of Things.

Introduction

This work will consist of analyzing the Internet of Things (IDC) its evolution, use and its risks in terms of use by people. This is why the following questions are asked:

  • What is the Internet of Things?
  • How does IDC influence the daily activities of people?
  • What threats can arise when using the IDC in public safety matters?
  • Why is it important?

Developing

The term "Internet of Things" (IoT) was coined by businessman Kevin Ashton, one of the founders of the MIT Auto Center. Ashton was part of a team that discovered how to link objects to the Internet through an RFID label. He used for the first time the phrase "Internet of Things" in a presentation in 1999 – and has rooted among us since then.

(IoT) refers to a vast number of "things" that connect to the Internet so that they can share data with other things – IoT applications, connected devices, industrial machines and more. Internet connected devices use integrated sensors to gather data and, in some cases, perform actions with them. Internet connected devices and machines can improve our way of working and living.

IoT connected devices are communicated through networks or cloud -based platforms connected to the Internet of things. Real -time insights that are obtained from these data collected from the IoT feed the digital transformation.

How the Internet of Things works

The IoT refers to machine -by -machine communication (M2M), that is, the connection between devices or objects such as cars or appliances;Machine to person communication (M2P) where, for example, sensors send information to people about their activities to be analyzed, and person to person (P2P) communication, through digital platforms for collaboration. Thus the term Internet of things is extended to become the internet at all.

IoT is based on two fundamental aspects. On the one hand, "things" (which can be from intelligent infrastructure devices). A second dimension of this evolution are the components, software and services that make possible these useful "things".

IoT devices are those physical devices that connect to the Internet. This technology involves risks to user information and integrity of networks.

Internet has connected the world creating connections that were not possible before, but this change is still underway. The IoT is coming and will transform our way of life as we know it.

The Internet of Things (IoT) or the Internet of things has begun to be part of the daily life of society: smart homes, intelligent education, intelligent health care, wearables, the internet of vehicles (IOV)and other industries, make great use of this technology playing a fundamental role in its digital transformation and in the hyperconnection of its elements.

The IoT ecosystem includes devices, networks, platforms and applications that require multiple security protection measures in each layer, as well as intelligence capabilities and security analysis of all the data to take advantage of the synergy between the devices and thecloud.

Among the risks of the use of IoT devices, Javier Rincón, Country Manager of Avast for Mexico, is that these devices can function as a point of entry to all the traffic of the networks to which users are connected. With this, whoever penetrates these networks through IoT devices can obtain “silently” many data that may be linked to financial information, email accounts and passwords.

"Criminals do not even need to be connected, since this information can be obtained passively," said Rincón in an interview.

Manufacturers should worry about the cybersecurity of their devices, both for their responsibility with user data and for the fact that "each device that we connect to a network is a potential entry point for a malicious attack," also made recommendationsso that users can protect themselves if they want to use this technology.

The truth is that cybersecurity problems are still progressively increasing, considering that the Internet was created to facilitate connectivity and in its design, development and implementation, security was not considered, so it now requires redoubling efforts to achieve cybersecurity in the greatInformation Network, which will undoubtedly have an impact on Internet Systems (IoT).

IoT is a paradigm that is growing with a significant impact on the technical, social and economic aspect. It raises new safety and size protection challenges that must be addressed to achieve maximum potential to guarantee the safety in the products and services offered in the IoT for the future. The IoT brings us closer to that future, but its other face requires considering cybersecurity to avoid cyber attacks.

In the coming years IoT will definitely transform business, since it will generate changes at the social and industrial level, its implementation will be total. However, its application will also generate important changes in cybersecurity, which must be redefined, since by incorporating a number of devices that in turn will generate a large volume of data, increases the vulnerability to cyberattacks to the same extent.

For the IoT world to be possible, two things are necessary: devices equipped with the necessary hardware to connect to the Internet and a telecommunications infrastructure that supports them.

The benefits of IoT

It will connect practically all objects to the Internet, allowing everything from doors, furniture or food, with sensors to measure and send data to the cloud. That is, everything around us will be intelligent, everything can be measured and tracked all the time.

The more connected the machines are, the more connected the people will be. The data will not be grouped into a single particular industry, but will be used in different sectors and companies, promoting innovation.

For example, smart vehicle data can help improve traffic, in turn helping to improve smart cities, which can make energy use more efficient and so on.

IoT applications are used to try to solve many real world problems – Traffic congestion, cities services, citizenship participation, economic development and public safety. Smart cities often incorporate IoT sensors into physical infrastructure, such as public lighting, water meters and traffic signs.

Internet of things helps suppliers to offer reliable services and products at fair prices. The devices and machines connected to the IoT anticipate problems before they occur.

IoT cybersecurity challenges

Due to the constant evolution of these technologies, it is very difficult to know what will be the scope of the advance of the IoT in the services of the future. However, what can be intuited today is the large number of cybersecurity and privacy problems of users who can affect them.

The collection of personal data of the users is inherent in the operation of these devices, regardless of the user’s level of consciousness regarding the personal information that is revealing with the use of these services, which is also a source of security problems.

Considering its impact on the safety and privacy of citizens (data processing and processing can be uncertain for users), the threat panorama concerning IoT is extremely broad. This information can reach third parties without the user being aware of the dissemination of the same.

Limitations in the possibility of remaining in anonymity when services are used: the advance of IoT technology will cause the loss of anonymity in the use of multiple services in which it is presupposed today as something guaranteed.

Security is fundamental from the analysis, planning and design of the system. IoT to be part of social infrastructure requires enough security measures. Therefore, professionals who specialize in the cybersecurity sector to cope with this demand for smart devices with proven safety and thus contribute to the technological transformation not overexposed to cyber attacks.

Raise awareness of users about the importance of cybersecurity, defining security guidelines from the beginning of the hardware and software development life cycle.

Mexico is lagging on the Internet of things

According to the Organization for Economic Cooperation and Development (OECD), through an exercise of exploration of the IP addresses of different devices, the volume of the IoT in Mexico is only just over 8 million of connected objects.

If we compare the statistics in population proportion, the penetration of connected devices equals 6.3% of the Mexican population, which places us in place 18 with respect to the same sample of 24 countries

The low purchasing power of the Mexican population and low adoption of technological developments in homes and even the lack of trained personnel to identify new internet security patterns and generate a high culture of information security in the users themselves.

And it’s not a small thing. According to a study by the Gartner consultant, by 2020 there will be approximately 26 billion devices connected to the Internet of things. However, a hyperconnected world also opens the door for governments and companies to have greater power and control over what we do.

conclusion

The total interconnection has many benefits, but it comes hand inThese activities so that in theory it is easier to be carried out, as well as create background for other people to observe it.

What learned in the course of this subject has been demonstrated that in all these computer advances there are people who take advantage of their compression ability of this technologies to carry out crimes against those who do not have that quality, if today today that the Internet of the Internet ofThings are not so advanced in the country and that there is not yet that interconnection that is intended, despite this we have a large number of cyberdelites in information robberies, identity robberies, accounts hacking and cash withdrawal, only bymention some.

As the test indicates, this technology still does not have the necessary safety conditions for its users, there are no necessary guarantees for those who use them that it will never be part of a cyber attack in which your person and heritage are at risk.

It is at this point that public safety must pay attention to how these cybercriminals act and what are their main objectives and their potential victims to create identification profiles that help them to seek to recipuse those crime rates.

Promote law reforms against these new crimes that will undoubtedly continue to arise as technology progresses.

What is a fact is that Mexico is not prepared for this technology in terms of safety for its users, there are no guarantees that they are not at any time part of a cybercrime like those we saw in the development of the subject and the worst ofAll this is that there is no legal framework either to help them with such a problem.

Free Cybersecurity Threats Posed By The Internet Of Things. Essay Sample

Related samples

Zika virus: Transmission form Introduction The Zika virus belongs to the Flaviviradae family, was found for the first time in a monkey called Rhesus febrile and in...

Zika virus: cases and prevention Introduction The World Health Organization (WHO) has confirmed that Zika is a virus caused through the mosquito bite which is...

Zeus The King of Greek mythology Introduction Zeus is the Olympic God of heaven and thunder, the king of all other gods and men and, consequently, the main figure...

Zeus's punishment to Prometheus Introduction Prometheus, punished by Zeus Prometheus, punished by Zeus. Prometheus is a ‘cousin’ of Zeus. He is the son of the...

Comments

Leave feedback

Your email address will not be published. Required fields are marked *