Loading...

Messages

Proposals

Stuck in your homework and missing deadline?

Get Urgent Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework Writing

100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Internet of Things Security Management Policies and Procedures

Category: Business & Management Paper Type: Report Writing Reference: MLA Words: 2100

            The aim of this paper is to provide deep insights regarding the security management policies & procedures regarding the internet of things (IOT). IOT has gain immense importance in the 21st century because of the technological advancement. IOT has revolutionized the world and have provided solution to a lot of problems. IOT can be defined as the network of various devices connected with each other to interact & share data with each other (Russell and Duren). Through IOT the internet connectivity has been expended beyond the traditional devices which include smartphones, desktops and laptops. Today the IOT is connecting devices such as cars, ovens and other electronic equipment’s. Since the number of devices increased the usage and challenges related to IOT have also increased as a result. One of the biggest challenges is related to the security policies of IOT. The data of the users contain sensitive information which can be used for wrong purposes (Li and Xu). The paper will discuss various security related challenges and how those challenges can be overcome through proper policies. The paper is divided into four main sections. The first section is the introductory section, second section discuss the components & key challenges in IOT, third section discuss the management policies & procedures and in the end the paper provide recommendations & conclusion.

IOT Practices to Large Companies of Internet of Things Security Management Policies and Procedures

            Internet of things (IOT) can be defined as the network of devices. Different devices are connected with each other so that they can interact and share data with each other. In the past the devices like laptops, desktops and smartphones were connected with internet to exchange information (Bhattacharjee). However IOT has allows individuals to connect other electronic devices with the internet as well. Today the experts believes that everything that is around us can be connected such as vehicles, home appliances etc. IOT has lots of applications and can provide more convenience to the society. IOT can be used in Medical health care, creation of Smart homes and for modernizing the current industrial processes (Management Association). It can be said that IOT has lots of advantages and have many applications for the future however there are lots of challenges that needs to be addressed in order to make this technology more beneficial for the users. One of the major challenge is the security concern that should be addressed to enhance the benefit (Jayakumar, Lee and Lee).

Components of IOT of Internet of Things Security Management Policies and Procedures

Following are the key components of the IOT that are discussed in detailed below:

Sensors & Physical Devices of Internet of Things Security Management Policies and Procedures

        OT ecosystem consist of analytics, cloud application and all the aspects related to the internet. The physical devices & sensor have the ability to gather the information (Mahalle and Railkar). After gathering the information the devices react accordingly. The devices or sensors are programed to perform various functions according to the information provided. The devices are the most important part of the IOT mechanism and without devices IOT system would not work (Roman, Zhou and Lopez).

Infrastructure & Connection of Internet of Things Security Management Policies and Procedures

            In the internet of things the devices needs to be connected with each other which means that necessary infrastructure is required for the connectivity of the devices. It means that internet infrastructure, storage, could, security and data processing facilities would be needed for the IOT system (Dawson, Eltayeb and Marwan). In the IOT system it is important that the information should be stored and secured for the users (Aziz, Arenas and Crispo). The data security is important because data breaches can cause financial loss of the individuals. Various technologies can be used for enhancing the security and privacy of the network (Rajpoot, Varshney and Nailwal).

Applications & Analytics of Internet of Things Security Management Policies and Procedures

            Various applications and analytics are developed to provide various benefits to the users. Through various applications the users can perform various tasks such as finding various locations, perform payments and sharing important data. The applications & analytics are developed by keeping the preferences and needs of the customers in mind. Specific applications are made for providing convenience to the users however they also raise security & privacy concerns as well (Chen and Erfani, A note on security management of the Internet of Things). It is important for the App manufacturers to enhance the security of the user data otherwise various issues Can arise in future which will not only effect the users but also to the business which are related to App manufacturing


Source: https://wikisites.cityu.edu.hk/sites/netcomp/articles/Pages/InternetofThings.aspx

Key Challenges & Threats to IOT

Security & Privacy of Internet of Things Security Management Policies and Procedures

            The privacy and security is a major challenge for the IT experts and in the growth of IOT ecosystem. Since more devices are connected with the internet the level of security concern has increased up to lot of extent. Today the users of the devices share sensitive data that can be used for inappropriate purposes through which the users can face financial loss (Wang, Bao and Wu). Therefore it is important to develop such security management policies which allow IT organizations to improve the security of the whole IOT ecosystem (Jayakumar, Lee and Lee).

Ecosystem of Internet of Things Security Management Policies and Procedures

        The IOT ecosystem consist of all the aspects of internet, devices and connectivity infrastructure. AS the IOT is experiencing growth over time more things are started entering into IOT ecosystem like everyday objects. It means that the level of complexity will increase up to lot of extent which would arise a lot of other problems from the security & privacy point of view (Jonckers). In future more advance mechanism would be needed for the management of such a complex IOT ecosystem which can only be done through strong management policies (Zarpelão, Miani and Kawakani).

Data & Information of Internet of Things Security Management Policies and Procedures

            The data & information would be a great challenge in the future. It is evident that more storage would be needed for storing and protecting the data. When huge amount of devices are going to be connected than the amount of data would be in large number and it is up to the IOT experts to manage the data efficiently (Chen, Security Management for The Internet of Things).

Man in the middle attack of Internet of Things Security Management Policies and Procedures

            The man in the middle attack would be one of the major threats for the IOT in the future. Man in the middle attack means that the third individual can intervene between two individuals when they are sharing information. Through this the third individual can hack the information and can use it for its own benefit. It means that the other two persons can face severe consequences due to this data breach (Liu, Zhao and Li). Over the years IOT experts have taken necessary actions to improve

DoS Attack of Internet of Things Security Management Policies and Procedures

            Denial of Services (DoS) Attack is among the most common cyber-attack and is major threat for IOT mechanism. The attack can cause the devices to become unavailable for use for the users. In order to mitigate or control such attacks necessary measures have to be taken for improving the security of the IOT system (Kasinathan, Pastrone and Spirito).


Source: https://www.ijcsmc.com/docs/papers/June2016/V5I6201699a9.pdf

Security Management policies & Procedures for IOT

Following are the main Security Management policies & Procedures which have been implemented to improve the security & privacy:

Attack Counter Measure Policy of Internet of Things Security Management Policies and Procedures

            The cyber attackers can get information about the security information keys and through this they might be able to reprogram the devices according to their own preferences. If group key has been implemented than the entire IOT network can get effected. The policy of forming unique keys can mitigate or control such cyber-attacks (Rajpoot, Varshney and Nailwal).

FTC Policies & Regulations of Internet of Things Security Management Policies and Procedures

            FTC (Federal Trade Commission) has allowed the corporations to create built in security in the devices which are being used in the IOT framework. For collecting the data FTC thinks that involving customer would be a great idea because through this not only the trust of the users can be gained but also new strategies for the improvement security can also be made.

Enhancement of data integrity of Internet of Things Security Management Policies and Procedures

            It is important to enhance the integrity of the data through encryption. When the data is going to be encrypted the man in the middle attack will be controlled up to lot extent. When the data is encrypted it becomes nearly impossible for the individual to decipher it (Roman, Zhou and Lopez).


Source: https://www.ijcsmc.com/docs/papers/June2016/V5I6201699a9.pdf

Conclusion on Internet of Things Security Management Policies and Procedures

        If all the above discussion is summarized than it is evident that IOT ecosystem consist of analytics, cloud application and all the aspects related to the internet. The physical devices & sensor have the ability to gather the information. After gathering the information, the devices react accordingly. The devices or sensors are programed to perform various functions according to the information provided. The cyber attackers can get information about the security information keys and through this they might be able to reprogram the devices according to their own preferences. If group key has been implemented than the entire IOT network can get effected. The policy of forming unique keys can mitigate or control such cyber-attacks.

Recommendations of Internet of Things Security Management Policies and Procedures

            It is recommended to the IOT experts to work according to the set guidelines. It is recommended to the organizations or IT experts to use authentic or trusted IOT devices so that no privacy/security concern could arise in the future. FTC have formed various policies for the improvement of security therefore it is responsibility of the It expert to create IOT ecosystem in accordance with the policies. FTC (Federal Trade Commission) has allowed the corporations to create built in security in the devices which are being used in the IOT framework.

References of Internet of Things Security Management Policies and ProceduresAziz, Benjamin, Alvaro Arenas and Bruno Crispo. Engineering Secure Internet of Things Systems. Institution of Engineering and Technology, 2016.

Bhattacharjee, Sravani. Practical Industrial Internet of Things Security: A practitioner's guide to securing connected industries. Packt Publishing Ltd, 2018.

Chen, Long and Shervin Erfani. "A note on security management of the Internet of Things." 2017 IEEE 30th Canadian Conference on Electrical and Computer Engineering (CCECE). 2017.

Chen, Long. "Security Management for The Internet of Things." 2017.

Dawson, Maurice, Mohame Eltayeb and Omar Marwan. Security Solutions for Hyperconnectivity and the Internet of Things. IGI Global, 2016.

Jayakumar, Hrishikesh, et al. "Powering the Internet of Things." (2014): 375-380.

Jonckers, Dimitri. "A security mechanism for the Internet of Things in a smart home context." 2016.

Kasinathan, Prabhakaran, et al. "Denial-of-Service detection in 6LoWPAN based Internet of Things." (2013): 600-607.

Li, Shancang and Li Da Xu. Securing the Internet of Things. Elsevier Science, 2017.

Liu, Xiruo, et al. "A Security Framework for the Internet of Things in the Future Internet Architecture." 2017.

Mahalle, Parikshit Narendra and Poonam N. Railkar. Identity Management for Internet of Things. River Publishers, 2015.

Management Association. The Internet of Things: Breakthroughs in Research and Practice: Breakthroughs in Research and Practice. IGI Global, 2017.

Rajpoot, Abha Kiran, Mukul Varshney and Aparajita Nailwal. "Security and Privacy Challenges in the Internet of Things." International Journal of Computer Science and Mobile Computing 5.6 (2016): 525 – 531.

Roman, Rodrigo, Jianying Zhou and Javier Lopez. "On the features and challenges of security and privacy in distributed internet of things." 57.10 (2013): 2266-2279.

Russell, Brian and Drew Van Duren. Practical Internet of Things Security: Design a security framework for an Internet connected ecosystem. Packt Publishing Ltd, 2018.

Wang, Kun, et al. "Research on security management for Internet of Things." 2010 International Conference on Computer Application and System Modeling (ICCASM 2010). 2010.

Zarpelão, Bruno Bogaz, et al. "A survey of intrusion detection in Internet of Things." 84 (2017): 25-37.

 

 

Our Top Online Essay Writers.

Discuss your homework for free! Start chat

Unique Academic Solutions

ONLINE

Unique Academic Solutions

6510 Orders Completed

Academic Master

ONLINE

Academic Master

2877 Orders Completed

Engineering Guru

ONLINE

Engineering Guru

8001 Orders Completed