Respond to the question below. Please cit your reference. Cy

Respond to the question below. Please cit your reference. Cybersecurity Risks from the Internet of Things (IoT)I would like to extend last week’s topic on the concerns related to connected cars, AI, and cell phones, to the increasing connectivity present in everyday objects around us, known as the “Internet of things”.In my research, I have found cases of a refrigerator hacked to reveal the owners Gmail login credentials (concerning, given our previous discussions that having access to the email account provides the potential to request password resets from a multitude of other sites) (Neagle, 2015).Also, a coffee pot hacked to gain access to the host wi-fi network, thereby providing access to everything else on the network (Margaritelli, 2017).More concerning to me, at least initially, was the ability to hack net-enabled door locks, where a person could download a permament key during a valid guest period in order to come back and unlock the door at any point in the future.Also concerning here were the reports of the company’s somewhat slow response and evasiveness in providing updates on the vulnerability (Wollerton, 2016).Finally, the enslavement of nearly 500,000 DVR devices and webcams to perform a DDoS attack against numerous popular sites, including Twitter, Paypal, and Spotify in October of 2016 (Thielman & Hunt, 2016).The overriding problem is that most of these devices are made with barely a thought for security, with any connected device you buy more likely to be insecure than secure (Schlesinger & Day, 2016).Given these concerns, and the lack of industry attention to the security concerns these connected devices raise, what potentially networked devices concern you the most in your home?Are there devices which you would absolutely refuse to purchase if web-enabled, due to security concerns?Are there any efforts in the works to improve the security environment for these types of devices?References:Margaritelli, Simone. (2017). The easy way your “smart” coffee machine could get hacked and ruin your life.Retrieved from (Links to an external site.)Links to an external site.Neagle, Colin. (2015). Smart refrigerator hack exposes Gmail login credentials.Retrieved from (Links to an external site.)Links to an external site.Schlesinger, J. & Day, A. (2016). Suddenly hot smart home devices are ripe for hacking, experts warn. Retrieved from (Links to an external site.)Links to an external site.Thielman, S. & Hunt, E. (2016). Cyber attack: hackers ‘weaponised’ everyday devices with malware. Retrieved from (Links to an external site.)Links to an external site.Wollerton, Megan. (2016). Here’s what happened when someone hacked the August smart lock. Retrieved from (Links to an external site.)

Place New Order
It's Free, Fast & Safe

"Looking for a Similar Assignment? Order now and Get a Discount!

Scroll to Top