You are on page 1of 4

1.

0 INTRODUCTION

The Internet of Things or what we call with was IoT, where it refers to the ever-growing
network of physical objects that have an IP address for Internet connectivity, and the
communication that exists between these objects and other Internet-enabled devices and
systems. The Internet of Things broadens internet connectivity beyond conventional devices
such as desktop and laptop computers , smart phones and tablets to a wide range of devices
and everyday things that use embedded technology to communicate and interact with the
surrounding environment through the Internet. When connecting all these different objects
and adding sensors to them will adds a level of digital intelligence to devices that would
otherwise be foolish, enabling them to communicate real-time data without engaging a
human being. The Internet of Things is making the fabric of the world around us more wiser
and more adaptable, combining the digital and physical universes. Next, the term IoT is
largely used for devices that would not normally be expected to have an internet connection
and can interact with the network independently of human activity. So, the examples for IoT
are usually used in security systems, thermostats, cars, electronic appliance, lights in
household and commercial environments, alarm clocks, speaker systems, vending machines
and more.
ISSUE AND CONCERN

One of the biggest risks to the IoT comes from the strain placed on the global network of
knowledge sharing that the IoT depends upon. The 2018 Global Risks Report highlights the
possibility of cyber-attacks and the danger to all interconnected undertakings if the IoT is
compromised by internal vulnerabilities. Clouds will be the first to be breached because security
regulations are not yet completely established despite how serious the problem is. Cybercrime's
annual economic cost is measured at around $1 trillion, which supersedes natural disaster costs
including Hurricane Sandy and Katrina. The recent increase in ransom-ware is expected to
present a significant security threat as the primary targets will be cloud vendors and service
providers. The essence of cloud operation is considered to be complex due to the various
clientele and market variations it offers. Consequently, if the cloud is corrupted,
interconnectivity may also be a drawback for different businesses. The security threats also
encompass devices and services based on Artificial Intelligence. Experts suggest malware is now
getting better at avoiding detection through AI. In contrast, some argue that AI is limited in its
activities due to the lack of human intervention, which also affects its performance in identifying
cause and effect in an investigation. Thus, AI may not be prepared enough to deal with the fast-
growing issues facing the cloud and IoT in the face of cyber-attacks.

Another pressing problem with IoT is user privacy. Not only is hacking a breach of
security but also a violation of the privacy of the user. A recent study at Glasgow University
shows consumers are largely unsatisfied with the lack of privacy that IoT allows them. When
consumers have become more aware of the scope of cyber-surveillance, they have begun to take
their privacy more seriously and demand that their data be directly regulated by them. There
needs to be increased corporate transparency to ensure user data is not vulnerable to others. For
example, large companies use a wide range of IoT devices , such as smart TVs, speakers and
lighting systems, connected printers, HVAC systems , and smart thermostats to constantly
harness, transmit, store, and process data. All these user data are commonly shared or even sold
to different companies, violating our privacy and data security rights and driving public distrust
further. Before we store and disassociate, IoT data payloads from information that can be used to
personally identify us so we need to set dedicated compliance and privacy rules that edit and
secure sensitive data.

The prospect of losing sensitive data through hacks is a risky proposition not only for
businesses but for nations through cross-border attacks as well. The World Economic Forum
predicts that these attacks will propel nations to create internet walls which will restrict the IoT
activity to specific regions. In addition, nations will eventually be motivated to protect their
economic interests, as governments are unable to operate freely within a global system of online
businesses. This essentially jeopardizes the very concept of the IoT as barriers prohibit
uncontrolled data sharing requested by many businesses. Such legislation will also stand in the
way of technical development.
Looking at the signs of this global battle, it's highly likely that cloud networks will be the next
possible threats to IoT. This is because cloud networks have the largest stocks of data to run the
IoT. According to recent statistics, in 2017 , the annual financial cost of cyber crime was
predicted at around $1 trillion, which is a multiple of the aggregate record-year cost of nearly
$300 billion from natural disasters in 2017. To understand the magnitude of the problem, the
World Economic Forum report cites a study that could cause financial damage of $50 billion to
$120 billion, putting forward the take-down of just one cloud provider. Companies need to
transmit IoT data to the network in the local region, which is then sent to the Internet. It can be
kept on cloud instance once the data is sent over the Internet. IoT devices transfer data in real
-time through device-installed sensors. Companies need to provide adequate bandwidth by
upgrading the local network and internet connection to support data flow.

CONCLUSION AND RECOMMENDATION

IoT technologies have becomes a part of our life where it is the most essential thing that we
need to undergo our daily life. IoT is a great, growing technology as they keep improving to the
better but there are still things that needed to be taken care especially in the security of IoT. For
example, fast technological growth has led to limited understanding of the IoT which is the
reason that most people do not aware about the security of IoT. It is essential to work on their
awareness of the changes taking place within IoT to make it more efficient for consumers to
make use of the internet and all that the IoT has to offer. Not only will they be empowered by
understanding, it will prepare them mentally and they may be able to find solutions on how to be
cautious of any of the above issues. So, everybody needs to enhance their knowledge in IoT.
Luckily, some easy solutions are within our reach and we will start to make the correct choice by
adding encryption, proactive security patching, and some stronger passwords. As with
everything, security should not be an optional extra, and should be considered as one of the first
things when developing a successful solution.
REFERENCE

Albert, C. (2018). Problems Of The Internet Of Things. Retrieved from DZone:


https://dzone.com/articles/problems-with-internet-of-things-you-need-to-know

Bautista, M. (n.d.). The Internet Of Things In The Real World. Retrieved from CIO Applications Europe
Web site: https://iot.cioapplicationseurope.com/cioviewpoint/the-internet-of-things-in-the-
real-world-nid-18.html

Harper, A. (2020). 10 Biggest Security Challenges Of For IoT. Retrieved from Peerbits All Right Web site:
https://www.peerbits.com/blog/biggest-iot-security-challenges.html

Ranger, S. (2020). What is the IoT:Everything you need to know about Internet Of Things. Retrieved from
ZDnet: https://www.zdnet.com/article/what-is-the-internet-of-things-everything-you-need-to-
know-about-the-iot-right-now/

Roe, D. (2018). 7 Big Problems With The Internet Of Things. Retrieved from CMS Wire:
https://www.cmswire.com/cms/internet-of-things/7-big-problems-with-the-internet-of-things-
024571.php

Stroud, F. (2020). IoT-Internet of things. Retrieved from webopedia:


https://www.webopedia.com/TERM/I/internet_of_things.html

You might also like