DATA RESOURCEMANAGEMENTICT616 FINAL EXAM
1.“10 Real World Applications of Internet of Things (IoT)”. Choose fourof these ten applicationsand discuss their possible challenges in regard to the CIA triangle.Answer:The CIA triangle, also known as Confidentiality, Integrity, and Availability, is aframework for setting information security policies within an organization.Access to information is restricted by a set of rules called Confidentiality. It’s designed to protectsensitive data from unauthorized access. The integrity and availability of information ensure thatit is accurate and reliable.The goal of the Internet of Things is to associate digital objects and computing tools with uniqueidentities and transfer data between networks without the need for human or computerintervention. The difficulty facing this agenda is recognizing the use of the CIA's triangle as adesign paradigm related to the principles foreseen in its policies and procedures (confidentiality,integrity, and availability). However, for information security reasons, the information is storedwithin the organization.a)Smart HomeAdvancements in technology and IoT capabilities are making smart homes more popular. Themain drivers behind this are improvements in Internet connectivity and the ability to enableremote access and monitoring. This technology is being adopted by users to improve thecomfort, convenience, and safety of their homes.Devices in your smart home can be remotely and automatically controlled through networkeddevices. Internet-related networks join gadgets in smart homes, permitting customers to remotelymanage features and access protection together with temperature, lighting, and domestic theatre.CIA challenges for Smart HomeThe smart home offers convenience and cost savings, but there are still problems faced with thistechnology. Both developers and users of this technology continue to have security concerns andflaws. Fer example, a skilled hacker can intelligently access any internet-connected device fromanywhere and can have access to all the data related to that central system. This will breach therule of confidentiality and integrity in the CIA triangle. Some smart home devices will ask forcustomers’ personal data while setting up, which might be stored by a third party or sold to third-party organizations for advertising purposes. So the biggest challenge of the Smart Home is thesecurity flaws in its system.b)WearablesWearable technology is becoming increasingly consumer-centric. The developers are focusing inmaking the devices smarter, lighter and more convenient products. These developments andtrends in the wearable market are pushing wearable technology into the mainstream, changing adadapting the wat we interact with virtually everything.CIA challenges for WearablesSecurity and privacy issues in wearable technology are the primary concern. It focuses on theuser data compromise and modification, insecure communications, actual data theft, use thedevice for surveillance and lack of encryption. Privacy attacks can also lead to user identity anddata integrity attacks and time and location-based attacks.
c)Smart CitiesAnother effective Internet of Things (IoT) application that has caught people’s attention is smartcities. Smart cities include smart surveillance, automated transportation, better energy
Want to read all 8 pages?
Previewing 4 of 8 pages Upload your study docs or become a member.
Want to read all 8 pages?
Previewing 4 of 8 pages Upload your study docs or become a member.
End of preview
Want to read all 8 pages? Upload your study docs or become a member.