Woolfson Eye Institute Basket Movies and Security Concerns Discussion Paper

User Generated

Fansbb

Humanities

Description

You are the Acting Compliance Officer for your financial services company. You were appointed to this job yesterday after the Compliance Officer announced a decision to retire – without prior notice. The e-mail announcing the retirement apparently came from the Compliance Officer’s new boat, anchored at a resort hotel’s dock on the island of Bali. Everyone believed it was a well-deserved three-week vacation. Apparently not.


You, who was one of the two Assistant Compliance Officers, was away on a business trip. On your return to the office this morning, the CEO and CFO called you in to show you the resignation email and congratulate you on your promotion.

Their first request was that you figure out if the former Compliance Officer could afford that boat or whether there was some sort of stealing from the company.

The second request was that there was a second e-mail from the now former Compliance Officer which read “Watch out for the Internet of Things devices in our workplace. I think they could spell trouble for us. Goodbye!” You’ve been asked by the CFO to explain what that second e-mail message meant, and what you can recommend being done to find out if, in fact, it could – or already does – mean trouble for the company. The company has both wired and wireless internet connectivity throughout the office. The wireless password is widely known.

For your primary post, write a response that answers two questions: Why might IoT be a problem for us? How can we tell if it is already a problem for us?

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached.

The Internet of Things and Security Concerns Discussion
According to Tawfik, Almadni, and Alharbi (2017), the internet of things refers to the
technique by which unique identifiers can be used to transfer data across a wide network of
interconnected devices, ranging from computers to objects embedded in daily lives of people,
without human interaction (Tawfik, Almadni, & Alharbi, 2017). Unlike computers, embedded
systems in the form of the internet of things are not designed with hackers in mind. Hackers have
been known to traditionally target computer systems such as servers and personal computers
because t...


Anonymous
Really great stuff, couldn't ask for more.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Similar Content

Related Tags