Question

Scan the articles to identify 3 patches recently made to operating systems or software applications for...

  • Scan the articles to identify 3 patches recently made to operating systems or software applications for mobile devices. Create a list of software vendors and the number of patches applied by each over the past year.
  • Scan the articles to identify cyberattacks related to the Internet of Things. Briefly describe the two most serious attacks you can find. What is being done to safeguard the Internet of Things from further, even more serious attacks?
0 0
Add a comment Improve this question Transcribed image text
Answer #1

Scan the articles to identify cyberattacks related to the Internet of Things. Briefly describe the two most serious attacks you can find. What is being done to safeguard the Internet of Things from further, even more serious attacks?

Many types of attacks have been around for a very long time. What’s new is the scale and relative simplicity of attacks in the Internet of Things (IoT) – the millions of devices that are a potential victim to traditional style cyber attacks, but on a much larger scale and often with limited, if any protection. At its core, IoT is all about connecting and networking devices that up until now have not necessarily been connected. This means that all of those devices, whether it is your brand new connected refrigerator or your connected vehicle, are creating a new entry point to the network and therefore posing an increasing security and privacy risk.

While the type of attacks often follow the same procedure as previously, the impact of each attack can vary dramatically, depending on the ecosystem, the device and environment, the available protection level and many more.

Over the last few weeks, we ran a small series of the 5 most common cyber attacks and how their threat rises to an unprecedented level with the possibilities of the IoT. In this blog you will find a summary of all the possible attacks, but follow the links for in-depth coverage on each attack – all of them have been covered on our blog in previous weeks!

Botnets

A botnet is a network of systems combined together with the purpose of remotely taking control and distributing malware. Controlled by botnet operators via Command-and-Control-Servers (C&C Server), they are used by criminals on a grand scale for many things: stealing private information, exploiting online-banking data, DDos-attacks or for spam and phishing emails.

With the rise of the IoT, many objects and devices are in danger of, or are already being part of, so called thingbots – a botnet that incorporates independent connected objects.

Botnets as well as thingbots consist of many different devices, all connected to each other – from computers, laptops, smartphones and tablets to now also those “smart” devices. These things have two main characteristics in common: they are internet enabled and they are able to transfer data automatically via a network. Anti-spam technology can spot pretty reliably if one machine sends thousands of similar emails, but it’s a lot harder to spot if those emails are being sent from various devices that are part of a botnet. They all have one goal: sending thousands of email requests to a target in hopes that the platform crashes while struggling to cope with the enormous amount of requests.

Man-In-The-Middle Concept

The man-in-the-middle concept is where an attacker or hacker is looking to interrupt and breach communications between two separate systems. It can be a dangerous attack because it is one where the attacker secretly intercepts and transmits messages between two parties when they are under the belief that they are communicating directly with each other. As the attacker has the original communication, they can trick the recipient into thinking they are still getting a legitimate message. Many cases have already been reported within this threat area, cases of hacked vehicles and hacked "smart refrigerators".

These attacks can be extremely dangerous in the IoT, because of the nature of the "things" being hacked. For example, these devices can be anything from industrial tools, machinery, or vehicles to innocuous connected "things" such as smart TV's or garage door openers.

Data & Identity Theft

While the news is full of scary and unpredictable hackers accessing data and money with all types of impressive hacks, we are often also our own biggest security enemy. Careless safekeeping of internet connected devices (e.g. mobile phone, iPad, Kindle, smartwatch, etc.) are playing into the hands of malicious thieves and opportunistic finders.

The main strategy of identity theft is to amass data – and with a little bit of patience, there is a lot to find. General data available on the internet, combined with social media information, plus data from smart watches, fitness trackers and, if available, smart meters, smart fridges and many more give a great all-round idea of your personal identity. The more details can be found about a user, the easier and the more sophisticated a targeted attack aimed at identity theft can be.

Social Engineering

Social engineering is the act of manipulating people so they give up confidential information. The types of information that criminals are seeking can vary, but when individuals are targeted, the criminals are usually trying to deceive the user into giving them passwords or bank information. Or they could be trying to access a computer in order to secretly install malicious software that will then give them access to personal information, as well as giving them control over the computer. Typically, social engineering hacks are done in the form of phishing emails, which seek to have you divulge your information, or redirects to websites like banking or shopping sites that look legitimate, enticing you to enter your details.

Denial of Service

A denial of service (DoS) attack happens when a service that would usually work is unavailable. There can be many reasons for unavailability, but it usually refers to infrastructure that cannot cope due to capacity overload. In a Distributed Denial of Service (DDoS) attack, a large number of systems maliciously attack one target. This is often done through a botnet, where many devices are programmed (often unbeknownst to the owner) to request a service at the same time.

In comparison to hacking attacks like phishing or brute-force attacks, DoS doesn’t usually try to steal information or leads to security loss, but the loss of reputation for the affected company can still cost a lot of time and money. Often customers also decide to switch to a competitor, as they fear security issues or simply can’t afford to have an unavailable service. Often a DoS attack lends itself to activists and blackmailers.

Concerns

A major concern in the IoT is the assurance of privacy. How will consumer data be used and by whom? An environment where your home, office, vehicles, appliances, office equipment and many other devices are connected to the internet raises new concerns for both consumers and businesses about where their data will go and how, of course, it will be used. Companies will have to evaluate the policies for privacy and data security to up their game and ensure collected data is safeguarded and kept private. Only when companies start doing this, there will be assurances of privacy.

While your business is likely to be faced with numerous types of attacks over the time, the main goal is not to get distracted by the exploit of the week.

Invest your time and money in a solid security structure, focus on the most common attacks, offer regular training to your staff to ensure they are able to spot attacks when they happen. Focus on the threats that are most likely to affect your business and are most likely to have a severe outcome. The answers to security concerns are out there: in the form of increased security, authentication and management of data.

Note: As per HomeworkLib guidlines we have to solve one question at a time.........you repost unsolved question seperately........if you have any problem plzz comment don't give dislike......plzzz give thumbs up i am in need.....

Add a comment
Know the answer?
Add Answer to:
Scan the articles to identify 3 patches recently made to operating systems or software applications for...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • you can get this Mining Big Data: Current Status, and Forecast to the Future pdf in the google search. this one is the article by Wei Fan Lab Instructions: Read the articles enclosed with thi...

    you can get this Mining Big Data: Current Status, and Forecast to the Future pdf in the google search. this one is the article by Wei Fan Lab Instructions: Read the articles enclosed with this assignment; Mining Big Data For each article, write a minimum of paragraphs. paragraph should provide you opinion of the article. Paragraphs should be approximately 4-8 sentences each. Do not plagiarize from the articles provided. All work should be your own. Submit your work as a...

  • 1. Data management, device management and network management of IoT is crucial to data integrity and...

    1. Data management, device management and network management of IoT is crucial to data integrity and transmission. T F 2. An IoT application is a set of wireless devices that act together to perform some sensing and control function. Most applications also provide a user interface, such as a mobile app or cloud-based service. In general, each application is deployed independently of any other applications that may be operating in the area and forms its own separate, cryptographically isolated network....

  • Read the case study "Google, Apple, and Facebook Struggle for Your Internet Experience" on page 255....

    Read the case study "Google, Apple, and Facebook Struggle for Your Internet Experience" on page 255. Then discuss the advantages and disadvantages for each company. BUSINESS PROBLEM-SOLVING CASE Google, Apple, and Facebook Battle for Your Internet Experience Apple has a legacy of innovation on its side. In Three Internet titans Google, Apple, and 2011, it unveiled the potentially market disrupting Facebook are in an epic struggle to dominate your Siri (Speech Interpretation and Recognition Internet experience, and caught in the...

  • Option #1: Governmental Accounting You are an accounting department employee of the State of Wisconsin with...

    Option #1: Governmental Accounting You are an accounting department employee of the State of Wisconsin with a love of all things technology. Because the head of your department knows you are the most technologically oriented person in the group, he has asked you to team up with the purchasing and IT departments to evaluate options for a more efficient accounting software system. The accounting system currently in use by Wisconsin is dated, and the system does not have the capability...

  • Option #1: Governmental Accounting You are an accounting department employee of the State of Wisconsin with...

    Option #1: Governmental Accounting You are an accounting department employee of the State of Wisconsin with a love of all things technology. Because the head of your department knows you are the most technologically oriented person in the group, he has asked you to team up with the purchasing and IT departments to evaluate options for a more efficient accounting software system. The accounting system currently in use by Wisconsin is dated, and the system does not have the capability...

  • IT's About Business 4.1 The Heartbleed Bug What Is Heartbleed? OpenSSL, an open-source software package, is...

    IT's About Business 4.1 The Heartbleed Bug What Is Heartbleed? OpenSSL, an open-source software package, is a popular type of transport layer security (TLS) software (discussed later in this chapter) that secures numerous websites around the world. Web servers use OpenSSL to encrypt sites. Such sites show up in browsers with a “lock” icon and the “https” prefix in the address bar. The encryption protects Internet sites offering banking, shopping, email, and other private communications. Roughly two out of three...

  • 1) analyze the following case 2) give a summary and suggest ways for the company ——————...

    1) analyze the following case 2) give a summary and suggest ways for the company —————— Salesforce.com, one of the most disruptive technology companies of the past few years, has single-handedly shaken up the software industry with its innovative business model and resounding success. Salesforce provides customer relationship management (CRM) and other application software solutions in the form of software as a service leased over the Internet, as opposed to software bought and installed on machines locally. The company was...

  • A new version of the operating system is being planned for installation into your department’s production...

    A new version of the operating system is being planned for installation into your department’s production environment. What sort of testing would you recommend is done before your department goes live with the new version? Identify each type of testing and describe what is tested. Explain the rationale for performing each type of testing. [ your answer goes here ] Would the amount of testing and types of testing to be done be different if you were installing a security...

  • Chapter 3 Information Systems, Organizations, and Strategy 103 INTERACTIVE SESSION: TECHNOLOGY IS...

    Chapter 3 Information Systems, Organizations, and Strategy 103 INTERACTIVE SESSION: TECHNOLOGY IS THE IPAD A DISRUPTIVE TECHNOLOGY? Tablet computers have come and gone several timesdistribution. Amazon has committed itself to offering before, but the iPad looks like it will be different It the lowest possible prices, but Apple has appealed has a gorgeous 10-inch color display, a persistent Wi publishers by announcing its intention to offer a Fi Internet connection, potential use of high-speed tiered pricing system, giving publishers the...

  • Please see the articles below… 1.  What is your opinion on the subject? 2.  Which ethical views (i.e.,...

    Please see the articles below… 1.  What is your opinion on the subject? 2.  Which ethical views (i.e., utilitarian view, moral rights view, justice view, practical view) you feel are being used by both sides of the argument (i.e., for and against downloading) to justify their positions? High Court Enters File-Sharing Spat; Justices Must Determine Software Providers' Liability For Copyright Violations by Anne Marie Squeo. Wall Street Journal. (Eastern edition). New York, N.Y.: Mar 30, 2005. pg. A.2 WASHINGTON -- The Supreme...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT