You are on page 1of 3

INTERNET OF THINGS

Is the system of interrelated computer devices, mechanical of digital machines ,


objects, animals or
people that are provided with unique identifiers and the ability to transfer data over a network
without
requiring human or human to computer interaction
Examples include, connected security systems, electronic appliances, lights in household and
many
others.
The internet is not 100% secure because hackers steal information from the records
center and other practices like malware proofing and spoofing thus record management having
challenge to secure their information
Overloading of users of the internet, this is where they are many users accessing the
website thus delay of network and information
Pharming: it means to point you to a malicious and illiterate website by directing the
legitimate URL.
This can convince you that the site error is real for legitimate by spoofing/ looking almost
identical to the
actual site down to the smallest details.
Hacking: the process by which cyber criminals gain access to your computer.
This can find weakness in your security and exploit them in order to access your information.
Malware: it is a malicious software that infects your computer like a computer virus,
worms that can
steal sensitive information.
Distributed denials of services: this is when a malicious user gets to network of zombie
computers to
sabotage a specific website or server. This occurs when an attack floods a network with useless
information
Viruses: it’s a malicious computer programs that often sent as an email attachment or a
download with
the internet of infecting your computer.
Spoofing: it is created to look like it comes from a legitimate source. It spends spam using your
email
address or a variation of your email address.
Insecure web interface. This allows the user to interact with the device but at the same
time could allow an attacker to gain unauthorized access to the device,
Insufficient Authentication, this deals with effective mechanism being in a place to
authenticate the internet if things whereby a user can gain higher levels of access then allowed
Insecure network services ’this is the network used to access the internet of things that
might allow an intruder to gain unauthorized access to the device
Insecure software, the lack of ability for the software to be updated presents a security
weakness on its own ,devices should have the ability to be updated when vulnerabilities are
discovered and software updates can be insecure when the updated files themselves and the
network connection they are delivered on are not protected.

Ransomware: Is the type of malware that restricts access to your computer your files and
displays a
message that demands payment in order for the restriction to be removed.
Poor physical security. Physical security weaknesses are presented when an attacker can
dissemble a device to easily access the storage medium and any data stored on the medium,
this cac esily lead to easy unauthorized access to the device or data

However, the internet of things may not be stopped from transforming the way we live an
different ways
as follows.
Scan internet downloads, ensure that all files downloaded from the internet are scanned for
computer
viruses before being used.
Ensure that the anti- virus software is up to date.
Don’t run programs to unknown origin. Its important that you use a trusted source of your
software
installed can be accounted for and that its source can be confirmed to be agreement
IMALINGAT SEKINA
217005110
17/U/4173/EVE

You might also like