Each response should be 150-180 words.

Each response should be 150-180 words.

Need induvidual responses of two discussions of 150 words each for below posts.Responses will be posted after assignation

Post 1

Discussion
The age of IoT and its future has tremendous potential which is considered to be limitless. As the advancements in the world are increasing day by day, the agility on the network, the integration of the artificial intelligence, the ability of the organization in the fundamentals of deployment and automation. IoT is sure to succeed primarily because of the two reasons, it has the ability to present an unprecedented reality time controlling, that removes the barriers spread across distance. This will also turn to be a game changer, irrespective of the industry it is associated with.

Security implications
One of the most important issues associated with the IoT devices is the increased surface attacks because of the number o devices joined to each other. In a particular network, endpoints seem to be the devices that are connected to the internet, where they offer entry points. nevertheless, the network is ought to be at high risks (Sivaraman, Gharakheili, Fernandes, Clark & Karliychuk, 2018).

Road to secure IoT devices
As IoT devices are a common affair at homes and workplaces, securing them is highly essential and there are numerous ways in which it can be done. They need to be designed with utmost security first in the mind, to ponder whether the applications associated with it are compatible or not. Also, the operating system chosen for using the IoT devices must be safe and secure, as well as compatible. Kernel operating system can be used for securing the IoT devices. They can also be evaluated to have a thorough check on the integrity status and later recorded on the server. However following points can be considered while using IoT devices.

Always change the password, the number of times you use the particular site.
Keep the home networks, always updated and keep a track of the number of devices joined to your network (Andersson, You & Palmieri, 2018)
References
Andersson, K., You, I., & Palmieri, F. (2018). Security and Privacy for Smart, Connected, and Mobile IoT Devices and Platforms. Security And Communication Networks, 2018, 1-2. doi: 10.1155/2018/5346596

Sivaraman, V., Gharakheili, H., Fernandes, C., Clark, N., & Karliychuk, T. (2018). Smart IoT Devices in the Home: Security and Privacy Implications. IEEE Technology And Society Magazine, 37(2), 71-79. doi: 10.1109/mts.2018.2826079

Post 2

The Internet of Technology is yielding to technological revolution through interconnecting multiple digital devices via the internet to enable speed, convenience, and efficiency. As these devices get more connected, there is an increasing risk of arising security risks. The IoT will lead to a further connection of the infrastructure, including dams, power plants, houses, cities, and cars, there is also a likelihood of catastrophic occurrences. Though Security experts continue to argue that IoT devices will eventually pose security risks, little has been done to solve such a dilemma (Eltayeb, 2017). There is a broad range of existing and potential IoT devices that consumers use to communicate, be it the smart speakers or home thermostat. By 2025, an estimated 21 billion IoT devices are likely to be interconnected based on statistical projections following a fast- forward market that continues to use the methods for daily and business activities (Ammar & Crispo, 2018). As technology continues to advance, more cities will become smart, the value of artificial intelligence will increase, cars will get more smatter, and the 5G network will proceed to fuel the IoT growth.

As the IoT interconnectivity rises, the cybercriminals will find more ways of facilitating the DDoS attacks. Ever since the world started experiencing the attacks related to the IoT interconnection that began in 2016 with the IoT malware, there has been a rapid increase in the attack mechanism that compromises these digital devices. Initially, the Internet of Things Malware such as the Mirai incident, the attackers accessed the IoT devices by getting hold of the default usernames and passwords. The malware eventually turned into a botnet, which necessitated the attack of Distributed Denial of Service Attack, which ended up overwhelming the websites with internet traffic. With the open-source code that allows accessibility by everyone to modify, more attacks are set to occur, especially those related to DDoS (Ammar & Crispo, 2018). It is vital to secure IoT devices because it will aid in protecting the multiple shared data, which is crucial in every aspect of life engagement (Bera, 2020). IoT security will also eliminate IoT device vulnerabilities, making it difficult for hackers to breach the devices and end up stealing confidential information.

References

Ammar, M., & Crispo, B. (2018). Internet of Things: A survey on the security of IoT frameworks. Journal of Information Security and Applications, 38, 8-27.

Bera, A. (2020, March 4). Why IoT device security is important. Retrieved from https://securityboulevard.com/2019/06/why-iot-devi…

Eltayeb, M. A. (2017). Internet of things. International Journal of Hyperconnectivity and the Internet of Things, 1(1), 1-18. doi:10.4018/ijhiot.2017010101

Requiremements

1) Each response should be 150-180 words.It should be also be cited according to APA format and atleast have 2 references not old more than 5 years.

2) It will be sunmitted it into safe asssign so the match percentage should be less than 15%.It means absolutely no plagiarism.

3) Some points mentioned by my professor regarding APA format

a)Citations: First off you can not just use any website. It needs to be of academic quality not just some random website. Also when you cite a website you do not just copy the hyper link and paste it in. There is more to it than that. There are lots of cites to help you with this. One example is https://www.citationmachine.net/apa/cite-a-website

b) APA Format: Many of you are not even trying to do APA format. You guys are missing a lot of the elements. Here is a link that will help you with a sample paper: https://owl.purdue.edu/owl/research_and_citation/apa_style/apa_formatting_and_style_guide/apa_sample_paper.html

c) Plagiarism: Some of you are getting a really high percentage on this. If the school feels you are plagiarizing you can get in a lot of academic trouble. I saw one person theirs was 80%

d) Typos: It is your responsibility to make sure that spelling and punctuation are correct. Some of you are not using comments and/or having some serious spelling errors. Once you post an assignment you need to verify that Blackboard did not mess it up and if did you may have to go back and MANUALLY fix it.

 

Image preview for each response should be 150-180 words.

Each response should be 150-180 words.

APA

437 words

Open chat
Hello
Contact us here via WhatsApp