17 Oct 2022

79

The Internet of Things: How It Works and Why You Should Care

Format: APA

Academic level: College

Paper type: Research Paper

Words: 769

Pages: 2

Downloads: 0

The use of Internet of Things has catalyzed the growth of a new generation of cyber security threats such as the use of malware used by cybercriminals to hack and steal data from vulnerable networks of unsuspecting users. This research paper focus on Internet of Cyber security issues in networks, computer hardware, and software systems. 

Keywords: Cyber Security, The Digital Age, Cybersecurity threats, Trends in Cybersecurity 

Internet dependence dominates the 21st-century technology platforms, and progressively new inventions are heavily reliant on the web connections to achieve maximum functionality. Internet of Things (IoT) is rapidly transforming the household landscape with users acquiring systems that can be remotely controlled using the IoT devices. However, these equipments are increasingly becoming exposed to the threats posed by cyber attacks such as hacking, data theft, and misuse. One of the dangerous cyber attacks was the WannaCry ransomware cyber-attack that led to the loss of over $ 1 billion from individual users and financial organizations ("Cybersecurity Statistics and Facts for 2017-2018 | Privacy.net"). According to a report by Cybersecurity Ventures, cybersecurity attacks targeting IoT gadgets and Individual computer software systems have increased by 600% and 200% respectively (Fruhlinger, 2018). In acknowledgment of this underlying fact, this research paper aims at undertaking an in-depth study in the emerging trends in cybersecurity issues in the 21st century with an ultimate goal of understanding the various threats that they pose in the life of IOT device users. 

It’s time to jumpstart your paper!

Delegate your assignment to our experts and they will do the rest.

Get custom essay
  1. Research Questions 

This research paper will aim at answering the following research questions: 

1. What are the emerging Internet of Things Cyber Security Issues? 

2. What type of risks do Internet of Things users face from using the devices? 

  1. Methodology 

This paper will adopt a literature-based research methodology with a special emphasis on the existing peer-reviewed sources that answer the paper research questions. Also, different statistical data reports and surveys conducted by various agencies will be examined to provide supporting evidence showing the extent of the problem. The data will be interpreted through a theoretical analysis approach to explain the various findings and theoretical assumptions made therein. 

  1. Literature Review 

Cybersecurity issues in the 21st century have tremendously evolved over the years. According to Jordan et al., (2018) the continuum of cybercrime attacks targeting social media accounts, online monetary systems, cloud services, and IoT devices have established new methodological styles. The working definition the threat is, “All types of activities conducted by an individual or entity with the aim of compromising confidential information that jeopardizes the target’s integrity of their available data(Schatz, et al., 2018).”. Reports published by various Cybercrime agencies including the US Federal government and Cisco, postulate that Ransomware is increasingly becoming one of the most lethal forms of cyber-attacks that organizations should remain very vigilant. It has emerged as one of the most effective ways to attack organization networks because it eliminates the need for human agents for installation and deployment (Schatz, et al. 98). The figure below illustrates findings by Fire Eye that shows a high rate of constant attacks targeting customers. 

  1. Results and Discussions 

The findings of this research indicate that emerging cybersecurity threats are rapidly becoming more advanced and pose a higher risk to the social, financial and physical aspects of society. The fact that hackers are increasingly choosing to adopt ransomware as a preferred mode of cyber-attack significantly raises the damage levels of the cyber-attacks. These new threat levels are insanely high, and there is a need to ensure that effective protocols are put in place to eliminate all forms of threats. The high-frequency rates of attacks and the discovery of IoT devices being used as points of entry into network systems, as Taeihagh & Lim, (2018) observes demands intervention that eliminates the risk of attacks. This paper proposes various interventions to be put in place to ensure that there towards the future the adverse effects remain relatively low. Active and real time monitoring IPS systems are effective strategic intervention to ensure that intruders are detected early and effectively eliminated from the networks. Other strategies may include regular employee training in various ways to ensure the security of devices within a network. 

Conclusion 

In conclusion, cybersecurity plays a fundamental role in advancing a safe and secure cyberspace environment. The emerging cybersecurity threats trends in the 21st century digital age are very advanced and thereby require conventional security solutions. IoT devices and malware have not only significantly increased the risk of cybercrime but also presented notable threats that are fundamental to the safety standards of using the internet and connected devices. It is, therefore, a requirement that cybersecurity laws and network protocols policy ensures that all web-based companies employ regular cyber-intelligence reporting. The intervention will ensure that all new threats that emerge are accurately identified and countermeasures put in place to prevent any substantial impact to the individual user or the company itself as the discussions in this paper shows. 

References 

Annon, D. (2019, July 4).  Cybersecurity statistics and facts for 2017-2018 . Privacy.net.  https://privacy.net/cybersecurity-statistics/ 

Fruhlinger, J. (2020, March 9).  Top cybersecurity facts, figures and statistics for 2020 . CSO Online.  https://www.csoonline.com/article/3153707/top-cybersecurity-facts-figures-and-statistics.html 

Jordan, G., Leskovar, R., & Marič, M. (2018). Impact of fear of identity theft and perceived risk on online purchase intention.  Organizacija 51 (2), 146-155.  https://doi.org/10.2478/orga-2018-0007 

Schatz, D., Bashroush, R., & Wall, J. (2017). Towards a more representative definition of cyber security.  The Journal of Digital Forensics, Security and Law https://doi.org/10.15394/jdfsl.2017.1476 

Taeihagh, A., & Lim, H. S. (2018). Governing autonomous vehicles: Emerging responses for safety, liability, privacy, cybersecurity, and industry risks.  Transport Reviews 39 (1), 103-128.  https://doi.org/10.1080/01441647.2018.1494640 

Illustration
Cite this page

Select style:

Reference

StudyBounty. (2023, September 14). The Internet of Things: How It Works and Why You Should Care.
https://studybounty.com/the-internet-of-things-how-it-works-and-why-you-should-care-research-paper

illustration

Related essays

We post free essay examples for college on a regular basis. Stay in the know!

17 Sep 2023
Technology

Implementation Roadmap

AT&T is a telecommunication company that has a platform for selling phones and provision of internet and other services. Implementation of big data analytics in the company requires the completion of a particular...

Words: 545

Pages: 2

Views: 70

17 Sep 2023
Technology

Big Data in Fraud Detection: How It is Used and What to Expect

Chameleon Carriers The replication of trucking companies and trucks under different business names has grown rampant, as the Federal Motor Carrier Safety Administration (FMCSA) program reports. A large...

Words: 508

Pages: 2

Views: 436

17 Sep 2023
Technology

The 5G Networks: How They Work, and What They Mean for the Future

The world of technology is rapidly developing with the reliance of the internet at its core. 4G has been the primary platform of the internet but based on the slow speed, and the high dependence of technology has led...

Words: 284

Pages: 1

Views: 111

17 Sep 2023
Technology

How to Write a Successful Business Case

A successful business case is based on a need. One of the most disturbing problems in the health sector is cybercrime. We intend to develop a strategy that will leverage IT-based techniques and measures to reduce...

Words: 263

Pages: 1

Views: 63

17 Sep 2023
Technology

The 5nm Transistor: The Future of Computing

The November 16th, 1904 invention of the vacuum tube was the humble beginning of the modern-day transistor. The first working transistors were developed at Bell Labs by William Shockley, John Bardeen, and Walter...

Words: 2221

Pages: 4

Views: 55

17 Sep 2023
Technology

Wireless Communication Technologies

Wireless communication taken analogically simply refers to the channel of telephony communication that does not apply the use of wires (Bose, 2010) . Such a channel makes use of electromagnetic waves available in the...

Words: 1046

Pages: 4

Views: 159

illustration

Running out of time?

Entrust your assignment to proficient writers and receive TOP-quality paper before the deadline is over.

Illustration