Harrison Middleton University Management Information System Paper

User Generated

ynqlynar12

Computer Science

Harrison Middleton University

Description

  • Locate one or more articles concerning cyber attacks related to the Internet of Things. Briefly describe the two most serious attacks you can find. What is being done to safeguard the Internet of Things from further, even more, serious attacks?

1. In the last portion of our project, perform a risk assessment based on learning and experience. What risks can you identify? What can be done to address them? Are any of them considered acceptable risks? Why and what will it cost if the risk becomes reality?

2. Discuss or expand on threats and plans to address them. Are your plans for security, both locally and online, sufficient? If not, what else can you do to protect your systems as well as your data?

3. Will you require training in ethics for employees? How will you respond to or enforce breaches due to employee error or deliberate misbehavior?

Explanation & Answer:
1000 words
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Please view explanation and answer below.

Running Head: MANAGEMENT INFORMATION SYSTEM

Management Information System
Student Name
Institutional Affiliation
Course Code
Instructor Name
Date

1

MANAGEMENT INFORMATION SYSTEM

2

Part 1 Internet of Things (IoT).
The article chosen is Cyber Security and the Internet of Things: Vulnerabilities, Threats,
Intruders, and Attacks.
https://www.riverpublishers.com/journal_read_html_article.php?j=JCSM/4/1/4- doi: https://doi.o
rg/10.13052/jcsm2245-1439.414
Recently, the Internet of Things (IoT) has grown tremendously, significantly impacting
social life and the business environment. All aspects of human life, such as healthcare, education,
entertainment, and business, have been saturated by IoT gradually. The increasing connectivity of
devices in the IoT has escalated the need to create robust security to counter- interact cyber-threats
that keep on increasing daily both in number and complexity. Due to such, IoT needs to be
protected against threats and susceptibilities to achieve its fullest potential.
IoT security is the ability to protect its objects against physical damage, theft, loss, and
unauthorized access while maintaining high confidentiality and integrity of the information and
making the information available when required.
Two Most serious Attacks for IoT Devices.
IoT attacks may harm the system or disrupt normal operations by manipulating
vulnerabilities by using various tools and practices. The intent of the attack maybe is personal or
recompense. Denial of service is an attack that tries to make the system unavailable to its
envisioned users. It is a widespread and severe attack that hackers can exploit in many ways and
forms. It can undermine the system or the network in performing its expected functionality. For
instance,...


Anonymous
Really useful study material!

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Related Tags