Assignment Sample on Cybersecurity on Internet of Things
Project Topic: Cyber Security in IoT
The project with the topic of cybersecurity in IoT is going to be made for understanding the need for cybersecurity in the drastically changing digital world. The title of the proposal selected as “Significance of Cybersecurity on Internet of Things” tends to explain the need for cybersecurity amidst the vulnerability of security in online platforms. The need for cybersecurity in IoT is to connect to the internet in operational technology while safeguarding the system from potential threats that are found online. As mentioned by Kosseff (2018), cybersecurity in IoT objects is needed to safeguard them from the potential threat of getting hacked, reducing the degree of vulnerability. Cybersecurity helps IoT objects work efficiently to protect the digital data of the user and serves the functionality of the object. However, IoT objects are difficult to adapt to due to the major factor of security which is extremely valuable to the personal, social and financial data of the user.
Aim: The primal aim of the research is to find the significance of cybersecurity in the Internet of things along with the legal, social and ethical issues related to it. The research will find out the dimensions of implementation of cybersecurity to safeguard the IoT objects as well as the user’s personal, social and financial data. The advantages and disadvantages regarding IoT and cybersecurity will be discussed thoroughly.
Research Objectives:
- To find the significance of cybersecurity in the Internet of Things.
- To assess the latest cybersecurity processes for protecting IoT devices
- To determine the existing challenges of cybersecurity in IoT.
- To obtain feasible mitigation methods for the existing challenges.
Research Questions:
- What will be the significance of cybersecurity in IoT?
- How will the latest cybersecurity challenges be processed to protect IoT devices?
- What will be the existing challenges in IoT?
- What will be the mitigation methods for the issues in IoT?
2. Question 2
Concept of IoT
The Internet of Technology (IoT) is new to the world as it has been able to provide comfort and a better lifestyle to people. With the help of IoT people are now able to use the internet in different objects such as switching lights, fans, kitchen appliances as well as vehicles. On the other hand, uninterrupted communication is possible among the people present in different parts of the world. As stated by Tweneboah et al. (2017), the main characteristic of the latest technology is it consists of a season that requires minimum power which describes it to be cost-effective and is thus accepted easily. The concept of IoT was first introduced by the International Telecommunication Union (ITU) in a report as a future advanced technology in 2005.
The report claimed that IoT can give information on the latest innovation such as the clothes providing data to the washing machine regarding its temperature required and colour. As mentioned by Cheng et al. (2017), in the case of IoT just like the human being the non-living objects such as cars can provide an alarm to send its message to their driver. IoT is considered to be a consolidated part that can perform the special task to make the lifestyle of people more advanced.
Cyber security challenges of IoT
One of the main challenges faced by IoT despite having exceptional features is security issues. As per the view of Tweneboah et al. (2017), Security Objectives (SO) and Information System (IS) of IoT needs to be high such that the data that are stored in the smart devices are not hampered by the cybercriminals. At present, cloud computing is seen to be added with IoT which makes IoT more exposable and it remains unguarded. The virus is itself present in cloud computation which has the efficiency to affect the services and results of IoT. Low-quality services and products of IoT are to be counted as a challenge as if the software is not up to date it would not function properly.
Due to the mechanical errors with the IoT devices, many people all over the world are noticed to be facing technical issues for a long period. It has been observed that in some cases replacement of the IoT device has not been possible on short notice. According to Matheu et al. (2019), due to lack of maintenance and poor suggestions from the IoT production companies the individuals as well as the business depending on such devices have to suffer. Another challenge that has been faced from IoT devices is inappropriate performance as there is a presence of fewer amounts of data. The passwords that are set for the latest tech IoT machines are not always found to be strong enough to protect them from hackers. It provides an opportunity for hackers to easily crack the password and interrupt the machines.
IoT structure for cyber security
In the IoT devices, there are four layers namely perception, network, processing, and application layers and the issues faced by them are different.
Perception Layer
The device chips clones at the perception layer whenever there is a cyber-attack in the perception layer of the IoT devices. As a result, Physical Unclonable Functions (PUFs) have been introduced in this specific layer to protect the data from cyber-attacks.
Network Layer
One of the important layers of the IoT machines is the network layer said is used to transmit the data throughout the entire network. As per the view of Fur faro et al. (2017), the availability of malware in this layer can create the locking of the entire device for which there is the implementation of Intrusion Detection System (IDS) such that the attackers are not able to corrupt the communications.
Processing Layer
In the following layer, two types of computation are being used that is fog computing and cloud computation as it deals with stocking and processing data. To find out the intrusion IDS is being used in this layer as well as for reducing the rate of the false alarm (Cheng et al. 2017).
Application Layer
The main function of the application layer of the IoT appliances is to manage, look after, share and mix necessary information. The service provider is an outsider which provides the opportunity for the attackers.
4. Question 4
There have been issues in the implementation of advanced cybersecurity measures in IoT for better security services. The issues identified are:
Legal
Legal Issues in the implementation of advanced cybersecurity in IoT and IoT devices require clear and legal frameworks and alternative approaches. As mentioned by Kosseff (2018), the legal issues in the implementation can be identified as security, privacy, government access and product liability. The issues in the identified areas and aspects of the IoT expansion for embedding cybersecurity can take up legal actions and frameworks following the Copyright Act of 1976 which may vary with demographics.
The rapid emergence of IoT and correspondent devices are designed for ease of use and access for the public which may have implications on the other. Claims of damage and violating privacy can be held as legal issues corresponding to loss of data, loss of privacy, data and identity theft (Kosseff, 2018). However, IoT is set to leap ahead of the technology to provide security and access in accordance with the legalised frameworks to be able to serve its purpose.
Social
Social issues in implementing cybersecurity in IoT and its corresponding devices can be identified as issuing of default passwords, malware, data security of mobile, website or cloud platforms. As per the analysis of Mouheb et al. (2019), the identified issue can hamper the social life of users while using the IoT devices in their day-to-day life.
However, there have been differences regarding the use of IoT in their daily or organisational life in different regions. The implementation of advanced cybersecurity in varied demographics has witnessed numerous restrictions regarding data security and theft, that have created a fluctuating image (Studer and de Werra, 2017). The societal issues may hamper the perceived notion of implementation of advanced cybersecurity. In correspondence, there has been a conflict regarding IoT and cybersecurity in organisations to compare the level of ease provided by the same. Organisational values have changed with the advent of digitalisation in its production and operational values for security.
Ethical
Apart from social and legal issues, the implementation of advanced processes of cybersecurity within IoT and smart devices have witnessed a series of ethical issues. As mentioned by Christen et al. (2020), the ethical issues of implementing an advanced level of cybersecurity in IoT can be identified as discrimination and inequality, informed consent, malicious use and privacy and trust in transparency.
The network of networks has to have enhanced customer service if chosen and can be used for manipulation of data resulting in potentially high impact. The means of increasingly tracking-capable software can be used in the wrong way to track people considered unethical (Shopinaet al. 2020). The discrimination and inequality with the consent of the user are equally unethical in the implementation of cybersecurity in IoT according to the Data Protection Act, 2018 varying with the demographics.
References
Cheng, S.M., Chen, P.Y., Lin, C.C. and Hsiao, H.C., 2017. Traffic-aware patching for cyber security in mobile IoT. IEEE Communications Magazine, 55(7), pp.29-35. Available at: https://arxiv.org/pdf/1703.05400
Christen, M., Gordijn, B. and Loi, M., 2020. The Ethics of Cybersecurity (p. 384). Springer Nature. Available at: https://library.oapen.org/bitstream/handle/20.500.12657/22489/1007696.pdf?sequence=1
Furfaro, A., Argento, L., Parise, A. and Piccolo, A., 2017. Using virtual environments for the assessment of cybersecurity issues in IoT scenarios. Simulation Modelling Practice and Theory, 73, pp.43-54. Available at: http://www.isihome.ir/freearticle/ISIHome.ir-26081.pdf
Kosseff, J., 2018, May. Developing collaborative and cohesive cybersecurity legal principles. In 2018 10th International Conference on Cyber Conflict (CyCon) (pp. 283-298). IEEE. Available at: https://www.repository.law.indiana.edu/cgi/viewcontent.cgi?article=1220&context=facbooks#page=292
Matheu-García, S.N., Hernández-Ramos, J.L., Skarmeta, A.F. and Baldini, G., 2019. Risk-based automated assessment and testing for the cybersecurity certification and labelling of IoT devices. Computer Standards & Interfaces, 62, pp.64-83. Available at: https://www.researchgate.net/profile/Sara_Nieves_Matheu_Garcia/publication/327099163_Risk-based_Automated_Assessment_and_Testing_for_the_Cybersecurity_Certification_and_Labelling_of_IoT_Devices/links/5be4197a92851c6b27af571a/Risk-based-Automated-Assessment-and-Testing-for-the-Cybersecurity-Certification-and-Labelling-of-IoT-Devices.pdf
Mouheb, D., Abbas, S. and Merabti, M., 2019. Cybersecurity curriculum design: A survey. In Transactions on Edutainment XV (pp. 93-107). Springer, Berlin, Heidelberg. Available at: https://www.researchgate.net/profile/Sohail_Abbas/publication/332699884_Cybersecurity_Curriculum_Design_A_Survey/links/5d9e1cc7a6fdcc04fac5dc9b/Cybersecurity-Curriculum-Design-A-Survey.pdf
Shopina, I., Khomiakov, D., Khrystynchenko, N., Zhukov, S. and Shpenov, D., 2020. CYBERSECURITY: LEGAL AND ORGANIZATIONAL SUPPORT IN LEADING COUNTRIES, NATO AND EU STANDARDS. Journal of Security & Sustainability Issues, 9(3). Available at: http://www.tb.lt/Leidiniai/Journal%20of%20Security%20and%20Sustainability%20Issues/2020-9(3)-full.pdf#page=249
Studer, E. and de Werra, J., 2017. Regulating Cybersecurity-What Civil Liability in Case of Cyber-Attacks?.Expert Focus, 8(2017), pp.511-517. Available at: https://archive-ouverte.unige.ch/unige:96220/ATTACHMENT01
Tweneboah-Koduah, S., Skouby, K.E. and Tadayoni, R., 2017. Cyber security threats to IoT applications and service domains. Wireless Personal Communications, 95(1), pp.169-185. Available at: https://www.researchgate.net/profile/Samuel_Tweneboah-Koduah2/publication/317283254_Cyber_Security_Threats_to_IoT_Applications_and_Service_Domains/links/5ab50b510f7e9b68ef4be69c/Cyber-Security-Threats-to-IoT-Applications-and-Service-Domains.pdf
Know more about UniqueSubmission’s other writing services: