Preview

IoT

Good Essays
Open Document
Open Document
977 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
IoT
The paper discusses the definition and issues of Internet of Things (IoT), which is basically a highly autonomous Internet and network infrastructure which connects physical and virtual objects, and by extension people, on a global scale through using data collected as well as communication. Internet applications are one such example of the IoT. As IoT is expected to collect a tremendous amount of information automatically, the problem of data security and privacy concerns a large number of people. In fact, the basis of IoT is divided into four factors: “pervasive identification and addressing, processing, networking, and sensing”. The word ‘pervasive’ is indicative of the intrusive nature of IoT, as can be evidenced by two of its features, namely data collected would come from various origins, and that it would be done without the user’s awareness.

The paper highlights five objectives to be achieved for IoT to avoid being misused and end up harming the users. The right of deletion, the right to be forgotten, data portability, privacy, and data protection principles must not be compromised or neglected. The following examples below list just three common ways that these five objectives were not met in many internet applications.

Firstly, one such risk is that a user’s personal information might not be directly known, but it could be revealed through IoT’s data collection from different sources or even uncover new information, thus violating the user’s privacy. A person who does not wish to be recognized online can therefore be identified through such means.

Secondly, the paper details that many applications only consider the installation of “information security, privacy and data protection” only as an afterthought, rather than in the beginning, at the drawing board. This compromises the application’s security and the user’s privacy substantially, as the capabilities of these measures would be reduced.

Thirdly, with the advent of cloud computing and social

You May Also Find These Documents Helpful

  • Good Essays

    BSA 375 Week 3 Individual

    • 793 Words
    • 3 Pages

    The level of security and its effectiveness in an application is a concern for all software development projects. Operations and Information Technology will hold key responsibility in implementation and maintenance of the software security measures. These measures will include but not be limited to firewalls, intrusion detection systems, credential verification, and standard backup operations (Valacich, 2012). This responsibility isn’t limited to just these measures or to this scope of responsibility. All hands that take part in development will have some responsibility in assuring appropriate security measures are developed, implemented, and maintained.…

    • 793 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Nt1310 Unit 1 Assignment 1

    • 1434 Words
    • 6 Pages

    Information has become the most valuable asset of any organization. And keeping that information secure is a major factor in the design and development of any computer system. Security is defined by Merriam-Webster as “the state of being protected or safe from harm”. It is up to every organization to insure that their data is protected, and that nothing that is harmful to the company or its clients is compromised.…

    • 1434 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    Information security is the protection of information against accidental or malicious disclosure, modification or destruction. Information is an important, valuable asset of IDI which must be managed with care. All information has a value to IDI. However, not all of this information has an equal value or requires the same level of protection. Access controls are put in place to protect information by controlling who has the rights to use different information resources and by guarding against unauthorised use. Formal procedures must control how access to information is granted and how such access is changed. This policy also mandates a standard for the creation of strong passwords, their protection and frequency of change.…

    • 1356 Words
    • 5 Pages
    Powerful Essays
  • Better Essays

    Cis 333 Final Term Paper

    • 2531 Words
    • 11 Pages

    In today’s IT world every organization has a responsibility to protect the information and sensitive data they have. Protecting data is not only responsibility of security and IT staff but every individual is involved in protecting the information. The risks to information security are not digital only, but it involves technology, people and process that an organization may have. These threats may represent the problems that are associated to complex and expensive solution, but doing nothing about these risks is not the solution.…

    • 2531 Words
    • 11 Pages
    Better Essays
  • Powerful Essays

    The year is 2010, the era is the 21st century; and we, citizens of the world, are living in the Information Age. Our information is made available on the Internet where it can be viewed by millions. The days where our data was recorded on scraps of paper and left in a box in an office along with thousands of other registers are long gone. Our personal data is permanently recorded in the hard drives of computers where they can be analysed and exploited by anyone with access to that computer; or worse, identity thieves and hackers may get their hands on the data.…

    • 3006 Words
    • 13 Pages
    Powerful Essays
  • Better Essays

    Almost everyone now days has some computer device on them almost all the time, people are always checking social media through smartphones or performing some online activity. The online infrastructure has endpoints; these endpoints transmit data. Businesses use many technologies to assist them in providing certain personal information that needs to be protected. For example, law enforcement uses computer devices to search for information on a suspect. There are other technologies such as monitoring devices from hospitals that allow real-time feedback of the patient's vitals. Many individuals use laptops or smartphones to access his or her online banking account to transfer, withdraw, or deposit money. All of the information that is gathered and stored online becomes vulnerable, and if…

    • 780 Words
    • 3 Pages
    Better Essays
  • Good Essays

    In this document I will be discussing the laws that are related to security and privacy of datas, I will explain how they relate to the security and privacy of data.…

    • 1633 Words
    • 7 Pages
    Good Essays
  • Satisfactory Essays

    It is important to have secure systems in place in respect of information handling in order to…

    • 379 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Privacy is a person’s right to control access to his or her personal information. Everybody value the protection of their personal information. No one wants to see some of their personal information made public, especially on the internet. However, the recent evolution of technology has started to threaten every individual’s privacy by reducing the amount of control that they had over their personal data and making it possible for people who do not have the proper authority to access them. According to Zalta (2014), the 21st century has become the century of Big Data and advanced Information Technology allows for the storage and processing of exabytes of data. The combination of increasing power of new technology and the declining clarity and agreement on privacy give…

    • 480 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Information Technology

    • 277 Words
    • 1 Page

    How is information used in the modern enterprise? How does this use affect IT systems?…

    • 277 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    assignment IST309

    • 1030 Words
    • 3 Pages

    The purpose of this paper is to talk about how security concerns of cloud computing matter to business as well as to other organizations and looking for the solution of the problems. Public cloud computing provides immense convenience but at the same time consists of huge privacy and security risks. The paper will discuss this problem from survey done by other researchers and the realistic problems cause by leakage of cloud data.…

    • 1030 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Personal Privacy

    • 813 Words
    • 4 Pages

    The purpose of this paper is to explain what I use to protect my personal privacy. There are many different things that can be use to protect someone’s information and keep hackers from accessing their computer. Some people use anti-virus, firewalls and anti-spam software to help protect their personal privacy. As we all know with today’s technology having just anti-virus or firewalls are not good enough, but having something is better than nothing. They do not protect you from new or custom-made viruses and evil-scripts. There is no one solution to protect you from Identity Theft, it’s just too many threats to keep up with, and having one software will not do the job for you. One key to protecting your information would be multi-layer protection; this means having more than one program monitoring you computer for different reasons.…

    • 813 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Technology and Privacy

    • 1148 Words
    • 5 Pages

    In the last twenty years, technology has been changing deeply our society: habits, style of life, and menagement of time are completely different. The globalization of the markets and information, the massive diffusion of mobiles and internet, have created many advantages in our workplaces, in our houses, in our cities but on the other hand they have reduced the liberty and the privacy of the individual person and their own goods.…

    • 1148 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Privacy can be generally broken down into three categories - physical, organizational and informational (Wikipedia, the Free Encyclopedia, 2008). Possessing privacy is not just about preventing "intrusions into one's physical space or solitude” (Smith, 1994). Instead, rapid advances in technology have propelled the safeguarding of privacy to the next level.…

    • 1111 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Every day we use about quintillion (1030) bytes of data; in fact over 90% of the data around has been generated in the past few (say 3 or 4) years. The near exponential growth of smartphone-tablet market is not as much of a concern as is the explosion of amount of data that is being dealt with. More the data more is the hazard of collecting, processing and retaining it. Smartphones have not become smart on their own. They are married to internet for a lifetime with their kids being e-mails, IMs, VOIP calls, video calls and many more. In the period 2000-2012, internet usage all over the world has seen around 560% growth. As the graph in Exhibit 1 shows, the growth has almost doubled from 2008 when the first android phone HTC Dream was launched. Terms called “Big Data”, “Cloud Computing” or “Internet of Things” (yet to be implemented) have become increasingly…

    • 984 Words
    • 4 Pages
    Good Essays