Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

In Learning Plan 8, you learned about privacy in the Internet of Things (IoT). T

ID: 3877745 • Letter: I

Question

In Learning Plan 8, you learned about privacy in the Internet of Things (IoT). The “Smart” objects, our phones, cars, refrigerators, washers/dryers, and vital biomedical equipment implanted in us are on a network. Remember, being on a network means the devices, whatever they are, talk to each other. How do we know this network is secure? Who administrates the IoT network? Who is responsible for securing the IoT? Do Internet research, three sources, and analyze and discuss these questions. Then discuss how comfortable you are with these smart devices. Cite your sources, NO WIKI anything. Your post must be at least 100 words long with correct grammar and spelling.

Please make copy paste available

Explanation / Answer

First of all we have just stated working with IOT and it's really an interesting and amusing technology. But you really not need to worry about whaterver they are they are still machines without subconciousness so one should not worry about dooms day as in Movie terminator.

So, now let me tell you both the pros and cons:

IOT has already revolutionised the way electronic euipment works by bridging the gap between the digital and electronic quipments. There are a lot of commerical equipments using IOT technology like Air conditioners could be controlled using a simple smartphone , television, washing machines, CCTV's etc.

The advantage could be for the disabled person who can control these euipments by just sitting on his wheel chair.

we may not aware of the fact but IOT has already become a part of our lives.

Securing the IOT: These days securing a network enabled device is nearly an impossible thing. But we can take measures for securing these devices. There should be certain set of protocols that a IOT technology must follow. There should be a layer to handle the network intrusions because most of the attacks are from the network.

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote