Trends in IT Services (Internet of Things).docx

However firms must consider security before

Info icon This preview shows pages 3–5. Sign up to view the full content.

However, firms must consider security before implementing any of these business solutions. Securing the Internet of Things As the Internet of Things grows, the security risks involved have grown more concerning. Using a general morphological analysis conducted on Wikistrat (a community of experts in varying fields), Tzezana (2017) found that the most likely high-impact cyberattacks on the IoT would be on power plants, cyber wallets, and personal assistants. Experts ranked various possible targets and methods, giving an estimate of the relative probability and negative impact of certain types of projected attacks. The study examines how a terrorist attack on a power plant could use the IoT to destabilize the country, how modifying transaction history could destroy reputations, and how blackmail could grant access to high-level corporate activity. While these situations remain speculative, they portray how the IoT’s security holes could create massive problems. Unfortunately, much of the IoT is not secure. Companies which have implemented IoT devices will not be inclined to pull them off the network for updates, which means that if an infection
Image of page 3

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

Running head: TRENDS IN THE IT SERVICES INDUSTRY 4 occurs, there will be widespread problems. Instead, it is best to be as complete as possible with security. One of the first places to add security is in the IoT devices themselves. The objects used in the IoT typically have the barest of technological complexity. While devices like laptops and tablets are built to access the Internet, the connectivity of the IoT does not rely on that kind of structure. As such, most sensors are unprotected from cyberattack. They lack some of the built-in kinds of security more complex devices have. Fu & Xu (2018) describe how a transduction attack exploits vulnerability in the circuitry of a sensor to manipulate its output or induce errors. Sensors can also be accessed with back-door interference. They are designed to detect specific phenomena, but sensors can be forced to accept illegitimate signals. The sensors themselves can be fooled by hackers, making it possible to invade the rest of the network. One possible way to protect the sensors directly is embedded security. If sensors are built to continuous check themselves for security issues, possible vulnerabilities can be detected sooner. Although some components in these IoT devices track debugging information, they don’t share it. Fu & Xu suggest a self-checking process that is visible to the entire system. Additionally, modifying the physical construction of circuit boards might prevent transduction attacks. A physical approach can ensure that the board will be above the resonant frequency which transducers generate. However, these kinds of changes to IoT devices work best for unexpected, physical attacks. IoT devices with embedded security will still have no protection against attacks that spread through software.
Image of page 4
Image of page 5
This is the end of the preview. Sign up to access the rest of the document.
  • Fall '16
  • Dr. Bass
  • Cybersecurity, Computer Security, Security guard, History of the Internet

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern