This is a class for cyber secuirty CFS432. Please anwer this question thourouly.
ID: 3785728 • Letter: T
Question
This is a class for cyber secuirty CFS432. Please anwer this question thourouly. thank you.
The Internet of Things (IoT) material talked about vulnerabilities being found and exploited in various embedded devices ranging from consumer network devices to surgically implanted medical devices. With attackers now turning some of these flaws into botnets capable of taking out some of the biggest web sites on the Internet, what do you feel is the best way to prevent more vulnerable devices from being released to the public? Are laws required, can the industry self-regulate, or is another approach needed?
The Internet of Things (IoT) material talked about vulnerabilities being found and exploited in various embedded devices. What do you feel is the best way to prevent more vulnerable devices from being released to the public?
Explanation / Answer
First we will discuss what is IOT(Internet of Things) and Why do we use it?
In simple words IOT is a network of connected devices equipped with softwares and sensors that makes these devices to collect and exchange information with each other.
Think for a while that how many device at your home is connected with internet.One is your main router, your mobile phone, your laptop and may be some smart devices like streaming dongle, temprature monitor ,security system.IOT is a combination of all such devices.All these devices communicate with each other and works as a automated system.
example-You are driving a car. A GPS unit in your car is connected through internet.Suddenly you met with an accident.In that case automatically message sent to police station that accident happens at particular place(along with GPS location).On the other end there is similar type of device which receives your message and sent approriate help.This is called automation system or IOT.
Why do we use IOT?
How to prevent our system from vulnerability???
There are very basic simple and easy steps to prevent your system from vulnerability...
Use Strong Password
Clean your system regularly
Change Default Settings
Points to remember
Laws against vulnerability
Already there are many laws in US and in other contries as well to deal with the internet vulnerability.
Computer Crime Law (US)
As we have seen time to time laws has been passed to prevent cyber crime.
What all we need to do to prevent vulnerability??
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.