Wednesday, May 6, 2020
Security Issues and Solutions for Data Security- myassignmenthelp
Question: Discuss about theSecurity Issues and Solutions for Data Security. Answer: Introduction Todays technological systems and devices are designed with the implementation of IoT, where they are developed using smart structures that generally improve their autonomous outcomes. These outcomes are facilitated by technologies such as radio frequency identification (RFID), where electromagnetic waves are used to identify and control devices remotely. Moreover, sensors and actuators are used to improve the control of the said devices which helps to improve the IoT outcomes. In general, this technological architecture of automatic connections, sensors and actuators is the defining component of IoT (Tanaka, Fujishima, Mimura, Ohashi, Tanaka, 2016). IoT is also majorly defined by the internet as its the main network that will facilitate communication among the devices or objects involved. Furthermore, it is through the internet that the different industries and fields will connect to each other, a vital aspect of IoT as it will have extended connections across all operating environments. In addition to this, IoT will use intelligent systems to perform its functionalities, a technological aspect that will influence the connectivity of different heterogeneous objects across different regions. Again, this outcome is met using the internet more so, through its protocols such as IP and IP addressing schemes (Vandana, 2016). Summary of the Discussions Vijayalakshmi and Arockiam (2016), highlight the security issues facing IoT in a general perspective, where the different operational activities are outlined, such as RFID tagging, wireless connections, transmission, privacy and data security. Now, RFID tagging is prone to many attacks including cloning and duplication an outcome that is facilitated by its minimal security features. Moreover, the same component of the technology will use wireless technology to connect devices which expose it to many security challenges. For one, wireless systems lack the physical protection provided by wired systems where access is granted through actual (physical) connection(Vijayalakshmi Arockiam, 2016). At the same time, IoT will have to contend with the issues of confidentiality, integrity and availability as its operating procedures grant extended access to information, an outcome that will affect the datas security as well as privacy. On the other hand, other researchers/scholars such as Vandana Suchitra (2016), define the security problems facing IoT based on the layers of operation. In essence, IoT will be defined based on a particular model or architecture in order to facilitate worldwide connection across different devices having different specifications. Now, this model will consist of four major layers; application, network, physical and perception. In each of these layers, different security problems are exhibited. For instance, the application will face end-user problems such as data tampering and eavesdropping. The network layer, on the other hand, will face data interruption problems through malware attacks and denial of services attacks. The same attacks will face the physical layer as it provides the channels of communication more so, through RF signals. Finally, the perception layer will face the security challenges of RFID tags and sensors where their interference will be the main form of attack(Vand ana, 2016). Finally, the discussion that is given by Chris Lu (2014) who focuses on the life cycle of the technology based on its implementation procedure. In his discussion, Lu focuses on three major aspects of IoT; development (manufacturers), installation and operation. In the first element i.e. development, the diversity of technology is highlighted where different manufacturers will develop different specifications thus will create varying security procedures. Furthermore, during the installation procedure, the installers who also are the manufacturers will have to implement secret keys and authentication procedures. Now, the responsible parties will again use varying systems which expose the entire connection of IoT to attacks as a weak link will act as an access point to the entire system. Finally, the operational aspect of IoT will house the security issues discussed by other scholars where the different operational layers are defined i.e. perceptions to the application layer(Lu, 2014). Issues not Addressed IoT faces many challenges even at its onset where in todays systems it is forced to contend with the security issues of the internet and other worldwide connections/networks. However, at a general perspective, the security problems facing IoT can be classified into two major categories; technical security issues and general security issues. Now, throughout the discussions given, a lot of emphases is given to the technical elements where attacks through the different layers of operation are given. Moreover, the vulnerabilities of these systems are outlined, however, little is discussed on the security issues propagated by the users and the developers of IoT i.e. the general problems(Singh, 2016). Yes, discussions are given by some scholars on these issues, where as seen above the diversity of the developers is outlined as a security challenge, however, the credibility of their operation is non-existent. Moreover, the discussions outlined above fail to consider the impact of encryption , authentication and transmission in the security problems. Data encryption will form a vital aspect of IoT security owing to the amount of information that will be collected and analysed. Therefore, the data retrieval processes used will have many challenges owing to the number of users and devices involved. Furthermore, remember this data is owned by different users i.e. is an intellectual property which deserves protection, a security challenge that is experienced today, however, is not outlined in the material highlighted above. Data authentication is another security issue that will face IoT but is marginally discussed by the researchers who are considered above(Singh, 2016). While encryption will protect the data, any legitimate user may falsify the information given by IoT devices. Therefore, establishing the authenticity of information given by the devices will be a major security issue that will require adequate procedures to solve. Finally, the transmission process, where channel attacks through timing and power consumption informat ion are involved. Now, while malware and denial of services attacks are outlined, side channel attacks are not given. In essence, these attacks will use the vital information of IoT devices to compromise systems such as RF links, timing and power consumption (Navigator, 2016). Impact of the Security Issues and Challenges of IoT Similar to the diversification seen in IoT, the security problems are also diverse in nature having different attack procedures. Consider the security issues outlined in the previous sections where the users, developers and the technology itself serve as vulnerabilities for the attacks propagated on IoT. Furthermore, the technologies that are seen today also influence the security problems of IoT as they are defining factors that will determine the success of its implementation. Now, consider the internet which as outlined above is highlighted as the main network that will facilitate the overall connection of the devices and gadgets. The security issues facing this technology i.e. privacy, authentication and data security are also threats that will face IoT in the future(Navigator, 2016). Nevertheless, the overall impact of the security problems highlighted above is the impairment of technological activities where networks and system performance is interfered with or halted. Now, these impairments can affect any aspect of life, more so business where resources are required to be optimised (Aldossary Allen, 2016). In all, the following impacts are defined based on the IoT challenges discussed: Information harvesting Information is a vital asset for the modern society as it defines the way of life. Consider businesses and the investments they make to safeguard their information in order to use it to make better decisions. It is in fact, through this investment that the different laws that protect users information have been developed. Today, different laws have been put in place to protect the user's and their data such as copyright laws that ensure users benefits from their work. Now, the security issues highlighted in this report compromise these laws as they affect the data involved (Hausman, Alston, Chapple, 2017). In essence, intruders will access and use data owned by other people which based on these laws is a criminal offence that has varying consequences on both the intruders and the systems used to access the assets. Time identified as the single most important resource of life, the security challenges of IoT affect the time of the users by interfering with their performance and work output. How is this so? Well, consider the impact of the attacks where IoT networks are compromised by intruders, the users (owners) will spend countless hours recovering their data and reinforcing the systems affected. While performing these actions they fail to conduct any meaningful business or other normal activities which affect their overall performance. Moreover, owing to the prevalence of the security issues, many activities will slow down owing to the fear of attacks and the effect of parasitic systems that interfere with computational resources. In general, IoT user will have more pre-cautions and verification procedures that will take up the time for other legitimate activities(Lu, 2014). Operational capacity a major impact on the security issue facing IoT as these problems heavily affect the devices involved. IoT will require intelligent systems as facilitated by computers with high processing power. Moreover, the same devices will also require large storage capacities to accommodate the data involved. However, with the security challenges highlighted above, these capacities (processors and storage) are interfered with affecting performance. Therefore, the security challenges facing IoT will affect the overall capacity of IoT technology(Hausman, Alston, Chapple, 2017). Reflection IoT like any other new technology faces many challenges most of which are related to its operational architecture. Its architecture is developed in such a way that it can accommodate all technological devices and objects, despite their differences. However, this mantra or mode of operation exposes the technology to intrusions as there are different weaknesses the structure that makes it susceptible to different types of attack (Martin Khazanchi, 2006). Now, starting with the layers of operation i.e. perceptions, physical, network and application, the technology has sequential vulnerabilities in its connection objectives. Moreover, these vulnerabilities affect different components which again are developed by different manufacturers which increase the severity of the problem. In addition to this, the problems facing IoT will continuously evolve with time which will require different responses and countermeasures. Therefore, the security issues facing IoT are a factor of time that wil l require innovative methods to combat. Conclusion IoT promises many benefits most of which are inclined to the access and availability of information. However, the same factors that enhance its practicality and application also affect its security which outlines the problems given in this report. In all, this report has highlighted a multitude of security issues facing IoT, from network intrusions to physical access of RFID devices. Now, while these challenges may vary in terms of the IoT element they affect, they all stem from the same factor, that of information. In general, the security problems facing IoT are associated with information which outlines the importance of protecting it. In fact, the security procedures used by the technology should be inclined to information access and protection more so through the CIA mantra i.e. confidentiality, integrity and availability. If these elements are maintained while using IoT, then the security problems will be adequately minimised. However, these elements and security procedures wil l have to stand the test of time because of the dynamic nature of the technology and the challenges themselves. References Aldossary, S., Allen, W. (2016). Data Security, Privacy, Availability and Integrity in Cloud Computing: Issues and Current Solutions. (IJACSA) International Journal of Advanced Computer Science and Applications, Retrieved 21 August, 2017, from: https://thesai.org/Downloads/Volume7No4/Paper_64-Data_Security_Privacy_Availability_and_Integrity.pdf. Hausman, K., Alston, N., Chapple, M. (2017). Protecting Your Network from Security Risks and Threats. Inform IT, Retrieved 21 August, 2017, from: https://www.informit.com/articles/article.aspx?p=419051seqNum=9. Lu, C. (2014). Overview of Security and Privacy Issues in the internet of things. Security and Privacy Issues in the Internet of Things, Retrieved 04 September, 2017, from: https://www.cse.wustl.edu/~jain/cse574-14/ftp/security.pdf. Martin, A., Khazanchi, D. (2006). Information Availability and Security Policy. Information availibility, Retrieved 21 August, 2017, from: https://pdfs.semanticscholar.org/729b/e826f50a51cf0f0574c2fa03017fa13ff30b.pdf. Navigator, T. (2016). Cyber security; cyber hygiene and the use of ICT on board. The Nautical institute, Retrieved 21 August, 2017, from: https://www.nautinst.org/download.cfm?docid=C295570F-E71B-4CD3-93E5DAEBC4AB2DB9. Singh, S. (2016). IoT Security-Issues, Challenges and Solutions. IOT, Retrieved 04 September, 2017, from: https://internetofthingswiki.com/iot-security-issues-challenges-and-solutions/937/. Tanaka, S., Fujishima, K., Mimura, N., Ohashi, T., Tanaka, M. (2016). IoT System Security Issues and Solution Approaches. Hitachi Review, Retrieved 21 August, 2017, from: https://www.hitachi.com/rev/archive/2016/r2016_08/pdf/r2016_08_111.pdf. Vandana, S. (2016). Internet of Things and Security Issues. International Journal of Computer Science and Mobile Computing, Retrieved 21 August, 2017, from: https://www.ijcsmc.com/docs/papers/January2016/V5I1201636.pdf. Vijayalakshmi, A., Arockiam, L. (2016). A study on the security issues and challenges of IOT. International journal of engineering sciences and management research, Retrieved 04 September, 2017, from: https://www.ijesmr.com/doc/Archive-2016/November-2016/5.pdf.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.