Integration of Cloud Computing with Internet of Things. Группа авторов
Чтение книги онлайн.

Читать онлайн книгу Integration of Cloud Computing with Internet of Things - Группа авторов страница 21

Название: Integration of Cloud Computing with Internet of Things

Автор: Группа авторов

Издательство: John Wiley & Sons Limited

Жанр: Программы

Серия:

isbn: 9781119769309

isbn:

СКАЧАТЬ those improvements could have been used in an update, but now you will be told of it, if, it is changed by the malicious software.

      2.7.8 Sensing of Infringement

      Intruders use various techniques to breach the computer’s protection. Intrusion detection checks incoming system signature data and notifies you when these attempts are detected. With intrusion detection, you can see what a hacker wants to do to hack your computer.

      Notifications help you to see what’s going on your firewall and to warn you of potential intrusion attempts on your device in different ways.

      2.8.1 Surveillance

      The reasons behind tracking the log files are three: There are three key reasons:

      Preventative Measures: You can see what harbors and services hackers are able to manipulate by tracking the firewall logs. Such knowledge will then be used to guarantee that the machine is safe against such exploits. For starters, when you see on your logs that other people are checking and investigating your machine for port 3127, you will discover that people and viruses will check for the backdoors on your machine which are left behind by the early version of the My Doom virus. You will then ensure that this new attack doesn’t damage the computers.

      2.8.2 Forensics

      If your machine is hit by a long distance virus, then you can check the date and time it was installed on your device by the hacker. Forensics: You will be able to search your log files for maltreatment of this data through all of this point of time, however the hacker has infiltrated your computer. This information is then used to encrypt your computer.

      Officials reporting: With the data stored in the log files, you are able to supply officials with the details whether a hack or attempt is a success. The logs send you the IP address, system and time and date of the offending device.

      2.8.3 Secure Firewalls for Private

       A Free online armor of Emsisoft

       The Firewall Outpost

       Zone Free Alarm

      2.8.4 Business Firewalls for Personal

       The McAfee Human Firewall

       The Firewall Outpost Pro

       Zone Pro/Plus Alarm

      2.8.5 IoT Security Weaknesses

      There’s no single IoT security vendor that can provide a full end-to-end security solution. However, some organizations provide more than others and some may provide a full end-to-end IoT security solution in tandem with their partner ecosystem.

      Authentication/authorization is one of the biggest issues to tackle in IoT security, followed by access control and data encryption. IoT security respondents didn’t consider firewall, passwords, server security and privacy as a major weakness.

Graph depicts the improvement in Internet of Things security.

      Figure 2.9 Where is security in IoT needed.

      The value-focused thought methodology has not been used to describe the protection goals of IoT from the consumer viewpoint. Extracting IoT security relevance from consumer expectations will enable administrators and professionals optimize IoT protection based on a detailed set of objectives.

      This research adds to the scope of the literature by incorporating basic goals and strategies for protecting IoT. This research explores the largely unexplored field of IoT protection. We perform a systematic analysis utilizing value-focused reasoning that has helped to identify goals and protection steps clustered into four simple and medium-sized priorities, which are important for protecting IoT from the individual perspective. We see why the device’s firewall is a must to defend the device from unethical hackers or viruses. We should be able to use the applications on the IoT with sufficient supervision and rules to further improve the protection of our device. We lock our doors to deter stolen robes when we leave our building, why not use a firewall to protect your computer?

      References

      1. Abbas, R., Michael, K., Michael, M.G., Using a Social-Ethical Framework to Evaluate Location-Based Services in an IoT of Things World. Int. Rev. Inf. Ethics, 22, 12, 2015.

      2. Abie, H. and Balasingham, I., Risk-based adaptive security for smart IoT in eHealth, in: Proceedings of the 7th International Conference on Body Area Networks, February, ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering), pp. 269–275, 2012.

      3. Agarwal, Y. and Dey, A.K., Toward Building a Safe, Secure, and Easy-to-Use IoT of Things Infrastructure. Computer, 49, 4, 88–91, 2016.

      4. Bassi, A. and Horn, G., IoT of Things in 2020 A ROADMAP FOR THE FUTURE, European Commission: Information Society and Media, 22, 97–114, 2008.

      6. Gartner, (n.d.), IoT of Things: The Gartner Perspective, Retrieved May 2, 2020, from https://www.gartner.com/en/information-technology/insights/IoT-of-things.

      7. Hunter, M.G., The use of RepGrids to gather interview data about information systems analysts. Inf. Syst. J., 7, 1, 67–81, 1997.

      8. Keeney, R.L. and McDaniels, T.L., Value-focused thinking about strategic decisions at BC Hydro. Interfaces, 22, 6, 94–109, 1992.

      9. Keeney, R.L., The value of IoT commerce to the customer. Manage. Sci., 45, 4, 533–542, 1999.

      10. Kounelis, I., Baldini, G., Neisse, R., Steri, G., Tallacchini, M., Pereira, A.G., Building trust in the human? IoT of things relationship. IEEE Technol. Soc. СКАЧАТЬ