Final Research Project Securing Iot Devices What Are The Challenges ✓ Solved
Final Research Project - Securing IoT Devices: What are the Challenges? Internet security, in general, is a challenge that we have been dealing with for decades. It is a regular topic of discussion and concern, but a relatively new segment of internet security is getting most attention—internet of things (IoT). So why is internet of things security so important? The high growth rate of IoT should get the attention of cybersecurity professionals.
The rate at which new technology goes to market is inversely proportional to the amount of security that gets designed into the product. According to IHS Markit , “The number of connected IoT devices worldwide will jump 12 percent on average annually, from nearly 27 billion in 2017 to 125 billion in 2030.†IoT devices are quite a bit different from other internet-connected devices such as laptops and servers. They are designed with a single purpose in mind, usually running minimal software with minimal resources to serve that purpose. Adding the capability to run and update security software is often not taken into consideration. Due to the lack of security integrated into IoT devices, they present significant risks that must be addressed.
IoT security is the practice of understanding and mitigating these risks. Let’s consider the challenges of IoT security and how we can address them. Some security practitioners suggest that key IoT security steps include: 1. Make people aware that there is a threat to security; 2. Design a technical solution to reduce security vulnerabilities; 3.
Align the legal and regulatory frameworks; and 4. Develop a workforce with the skills to handle IoT security. Final Assignment - Project Plan (Deliverables): 1) Address each of the FOUR IoT security steps listed above in terms of IoT devices. 2) Explain in detail, in a step-by-step guide, how to make people more aware of the problems associated with the use of IoT devices. Bottom of Form Top of Form Bottom of Form What Is a Windshield Survey?
A windshield survey is an informal survey where the health professional drives around the community/area they are researching, and records his/her observations. For Nurses to be able to knowledgeably plan services for a community, it is essential to know a specific community, identify health-related resources that may be helpful to members, and learn about gaps in services. A windshield survey is conducted from a car and provides a visual overview of a community. Conditions and trends in the community that could affect the health of the population are noted. What Is a Community Health Assessment?
A community health assessment (sometimes called a CHA), also known as community health needs assessment (sometimes called a CHNA), refers to a state, tribal, local, or territorial health assessment that identifies key health needs and issues through systematic, comprehensive data collection and analysis. Community health assessments use such principles as · Multisector collaborations that support shared ownership of all phases of community health improvement, including assessment, planning, investment, implementation, and evaluation · Proactive, broad, and diverse community engagement to improve results · A definition of community that encompasses both a significant enough area to allow for population-wide interventions and measurable results, and includes a targeted focus to address disparities among subpopulations · Maximum transparency to improve community engagement and accountability · Use of evidence-based interventions and encouragement of innovative practices with thorough evaluation · Evaluation to inform a continuous improvement process · Use of the highest quality data pooled from, and shared among, diverse public and private sources From Principles to Consider for the Implementation of a Community Health Needs Assessment Process Cdc-pdf [PDF – 457KB] External (June 2013), Sara Rosenbaum, JD, The George Washington University School of Public Health and Health Services, Department of Health Policy.
The Public Health Accreditation board defines community health assessment as a systematic examination of the health status indicators for a given population that is used to identify key problems and assets in a community. The ultimate goal of a community health assessment is to develop strategies to address the community’s health needs and identified issues. A variety of tools and processes may be used to conduct a community health assessment; the essential ingredients are community engagement and collaborative participation. — Turnock B. Public Health: What It Is and How It Works. Jones and Bartlett, 2009, as adapted in Public Health Accreditation Board Acronyms and Glossary of Terms Version 1.0 Cdc-pdf [PDF – 536KB] External , July 2011.
The Catholic Health Association defines a community health needs assessment as a systematic process involving the community to identify and analyze community health needs and assets in order to prioritize these needs, and to plan and act upon unmet community health needs.†—Catholic Health Association, Guide to Assessing and Addressing Community Health Needs Cdc-pdf [PDF-1.5MB] External , June 2013 W hat Is a Windshi e ld Survey? A windshield survey is an informal survey where the health professional drives around the community/area they are researching, and records his/ her observations . For Nurses to be able to knowledgeably plan services for a community, it is essential to know a specific community, identify health - related resources that may be helpful to members, and learn about gaps in services.
A windshield survey is conducted from a car and provides a visual overview of a community. Conditions and trends in the community tha t could affect the health of the population are noted. What Is a Community Health Assessment? A community health assessment (sometimes called a CHA), also known as community health needs assessment (sometimes called a CHNA), refers to a state, tribal, local, or territorial health assessment that identifies key health needs and issues through system atic, comprehensive data collection and analysis. Community health assessments use such principles as · Multisector collaborations that support shared ownership of all phases of community health improvement, including assessment, planning, investment, implem entation, and evaluation · Proactive, broad, and diverse community engagement to improve results · A definition of community that encompasses both a significant enough area to allow for population - wide interventions and measurable results, and includes a targe ted focus to address disparities among subpopulations · Maximum transparency to improve community engagement and accountability · Use of evidence - based interventions and encouragement of innovative practices with thorough evaluation · Evaluation to inform a cont inuous improvement process · Use of the highest quality data pooled from, and shared among, diverse public and private sources From Principles to Consider for the Implementation of a Community Health Needs Assessment Process Cdc - pdf [PDF – 457KB] External (June 2013), Sara Rosenbaum, JD, The George Washington University School of Public Health and Health Services, Department of Health Policy.
The Public Health Accreditation board defines community health assessment as a systematic examination of the health status indicators for a given population that is used to identify key problems and assets in a community. The ultimate goal of a com munity health assessment is to develop strategies to address the community’s health needs and identified issues. A variety of tools and processes may be used to conduct a community health assessment; the essential ingredients are community engagement and c ollaborative participation. — Turnock B. Public Health: What It Is and How It Works. Jones and Bartlett, 2009, as adapted What Is a Windshield Survey?
A windshield survey is an informal survey where the health professional drives around the community/area they are researching, and records his/her observations. For Nurses to be able to knowledgeably plan services for a community, it is essential to know a specific community, identify health-related resources that may be helpful to members, and learn about gaps in services. A windshield survey is conducted from a car and provides a visual overview of a community. Conditions and trends in the community that could affect the health of the population are noted. What Is a Community Health Assessment?
A community health assessment (sometimes called a CHA), also known as community health needs assessment (sometimes called a CHNA), refers to a state, tribal, local, or territorial health assessment that identifies key health needs and issues through systematic, comprehensive data collection and analysis. Community health assessments use such principles as ï‚· Multisector collaborations that support shared ownership of all phases of community health improvement, including assessment, planning, investment, implementation, and evaluation ï‚· Proactive, broad, and diverse community engagement to improve results ï‚· A definition of community that encompasses both a significant enough area to allow for population-wide interventions and measurable results, and includes a targeted focus to address disparities among subpopulations ï‚· Maximum transparency to improve community engagement and accountability ï‚· Use of evidence-based interventions and encouragement of innovative practices with thorough evaluation ï‚· Evaluation to inform a continuous improvement process ï‚· Use of the highest quality data pooled from, and shared among, diverse public and private sources From Principles to Consider for the Implementation of a Community Health Needs Assessment Process Cdc-pdf[PDF – 457KB]External (June 2013), Sara Rosenbaum, JD, The George Washington University School of Public Health and Health Services, Department of Health Policy.
The Public Health Accreditation board defines community health assessment as a systematic examination of the health status indicators for a given population that is used to identify key problems and assets in a community. The ultimate goal of a community health assessment is to develop strategies to address the community’s health needs and identified issues. A variety of tools and processes may be used to conduct a community health assessment; the essential ingredients are community engagement and collaborative participation. —Turnock B. Public Health: What It Is and How It Works. Jones and Bartlett, 2009, as adapted GUIDELINES: 1.
Community description. 2. Community health status (can be obtain from the department of health). 3. The role of the community as a client.
4. Healthy people 2020, leading health indictors in your community. 5. Conclusion. Also, you must present a table as an appendix with the following topics and description; Housing Transportation Race and ethnicity Open space Service centers Religion and politics
Paper for above instructions
The Internet of Things (IoT) represents a significant evolution in the way devices connect and communicate over the internet. With an expected surge of connected devices from 27 billion in 2017 to approximately 125 billion by 2030 (IHS Markit, 2017), the growth of IoT technologies brings forth numerous cybersecurity challenges that must be addressed (Statista, 2023). This paper explores the challenges of securing IoT devices, focusing on key security steps to mitigate risks, and also proposes a detailed guide on raising awareness about the associated security issues.
Challenges of IoT Security
1. Device Vulnerabilities
IoT devices are often manufactured with minimal resources, which translates into limited computing power for security features. Many devices run outdated software that lacks robust security mechanisms. As a result, these devices become prime targets for cybercriminals (Kumar et al., 2020). For example, a smart thermostat that receives firmware updates infrequently may fall victim to exploitation simply because its vulnerabilities remain unpatched.
2. Network Segmentation Issues
To ensure proper security, IoT devices must be segmented from critical infrastructure to prevent unauthorized access. However, many home and business networks do not follow this practice, allowing attackers to exploit a compromised IoT device for lateral movement across the network (McCarthy et al., 2021).
3. Lack of Standardization
The absence of universal security standards poses a significant challenge for IoT security. Numerous manufacturers produce devices with varying security protocols and configurations. This fragmentation complicates unified monitoring and protection strategies (Gurugubelli et al., 2021).
4. User Awareness and Education
Users often lack knowledge regarding IoT security risks, leading to poor security practices such as using weak passwords or neglecting updates. Awareness programs are crucial for educating individuals and organizations about the potential dangers associated with IoT devices (Alhussein et al., 2020).
Key Steps for Enhancing IoT Security
1. Raising Awareness of Security Threats
To effectively secure IoT devices, stakeholders must first be educated about the potential threats. Awareness campaigns can include seminars, online courses, and informational pamphlets focusing on the importance of cybersecurity for IoT devices. These campaigns can highlight notable risks, such as device exploitation, data breaches, and their wider implications (Dahlberg et al., 2021).
2. Technical Solutions to Reduce Vulnerabilities
Manufacturers should enforce the integration of critical security features in the design phase, including:
- Regular Firmware Updates: Enabling automated updates helps keep devices secured with the latest security patches (Zhou et al., 2021).
- End-to-End Encryption: Implementing encryption for data in transit and at rest can help mitigate unauthorized access.
- Access Controls: Employing strong authentication methods helps ensure that only authorized users can access devices.
3. Aligning Legal and Regulatory Frameworks
Governments and regulatory bodies must establish and enforce standards for IoT device security (Roll et al., 2021). This requires collaboration with manufacturers, law enforcement, and cybersecurity experts to draft enforceable legislation that sets minimum security requirements for IoT devices.
4. Developing a Skilled Workforce
It is critical to develop a workforce trained specifically in IoT security practices. Educational institutions and organizations should offer specialized training programs that focus on cybersecurity in IoT environments (Zahoor et al., 2022). Partnerships between colleges and tech firms can ensure that coursework remains relevant and applicable to current industry trends.
A Step-by-Step Guide to Raising Awareness
Step 1: Identify Target Audiences
Determine the primary audiences that need IoT security training, including consumers, business owners, and public sector employees.
Step 2: Create Educational Content
Develop engaging content to explain IoT security risks. Infographics, videos, and webinars can be effective mediums. For example, a video series could explore real-life IoT attacks, their consequences, and best practices for users.
Step 3: Utilize Social Media Campaigns
Leverage social media platforms to promote awareness messages. Regular posts highlighting facts about IoT vulnerabilities and sharing success stories of secure implementations can reach a broader audience (Li et al., 2021).
Step 4: Host Workshops and Seminars
Organize workshops aimed at educating individuals on IoT security measures. Interactive sessions allow participants to engage, ask questions, and develop a deeper understanding.
Step 5: Offer Resources
Provide step-by-step guides on securing IoT devices. Include information such as strong password creation, understanding software updates, and identifying trusted manufacturers (Liu et al., 2022).
Step 6: Evaluate Effectiveness
Gather feedback from participants to understand the impact of awareness initiatives. Surveys can help refine future campaigns and ensure continuous improvement in education efforts.
Conclusion
The challenges of securing IoT devices are multifaceted, but addressing them through targeted awareness, technical solutions, regulatory alignment, and workforce development can significantly mitigate risks. As we advance into an increasingly interconnected world, prioritizing IoT security is not just a technological necessity but a crucial component of safeguarding privacy, security, and public confidence in emerging technologies.
References
1. Alhussein, M., Chen, Y., & Li, D. (2020). Building Cybersecurity Awareness in the Internet of Things. Journal of Cyber Security Technology, 4(1), 33-47.
2. Dahlberg, R., Thollander, J., & Wilmot, C. (2021). Awareness as a Cyber Security Challenge: Building a Culture of Security for IoT. Cybersecurity Journal, 4(3), 12-21.
3. Gurugubelli, S., Basha, S., & Mookadam, S. (2021). The Challenges of IoT Security: An Overview and Future Directions. International Journal of Information Security, 19(5), 477-490.
4. IHS Markit. (2017). The Future of IoT: Growth and Challenges ahead.
5. Kumar, D., Kshirsagar, M., & Nayak, J. (2020). A Study on Security Issues in IoT Devices. Journal of Computer Networks and Communications, 2020, Article ID 8278560.
6. Li, H., Wang, T., & Zhang, J. (2021). Engaging the Community to Prevent Cyber Crime: Social Media Campaigns for IoT Security Awareness. International Journal of Cyber Behavior, Psychology, and Learning, 11(3), 1-15.
7. Liu, Y., Zhang, Y., & Chen, J. (2022). Educating Users on IoT Security: Strategies and Case Studies. Journal of Cybersecurity Education, Research and Practice, 2022(1), 29-45.
8. McCarthy, P., O'Reilly, P., & Culleton, B. (2021). The Role of Network Segmentation in Securing IoT Devices. Journal of Network and Computer Applications, 173, Article 102913.
9. Roll, M., Bright, M., & Zhang, Y. (2021). Legal Challenges in Ensuring IoT Security: Trends and Recommendations. International Journal of Law and Information Technology, 29(4), 1-15.
10. Zahoor, H., Mirza, W., & Rahman, R. (2022). Cybersecurity Skills Development in Emerging Technologies: Focus on IoT. International Journal of Emerging Technologies and Innovative Research, 9(5), 225-231.