Paper Title in Bold at the Top of Page 2
Three errors I have identified in the architectural diagram are that all IoT devices are
running on the same single network, the second error is that the IoT devices are able to access the
internet using the wireless access point, and the third error is that there is no firewall to protect
the IoT devices from malicious attacks.
All the IoT devices are to blame for this error. The wireless access point connects all the
IOT devices to the workstations/devices, making each device vulnerable. Anyone without access
to this information can easily obtain sensitive information through this method. To protect all
data, this design error needs to be redesigned and a firewall should be implemented to keep the
workstations/devices data from the IoT devices. The firewall should be configured to block IoT
devices from accessing the workstations/devices. The system can continue to function without
addressing error, but it will be more vulnerable to attacks. The IoT devices can access
workstations/devices, which may contain sensitive and valuable data, without the firewall. To
prevent this, the firewall should be properly configured and monitored to ensure that all IoT
devices are blocked from connecting to the workstations/devices.
A router is the best solution to ensure all data can be protected on the IoT wireless
network and the workstation wireless network. The router should only allow access to IoT
devices and block access to the workstation network. This will stop data leaks from the IoT
network into the workstation network. By encrypting the IoT network's data, it addresses the CIA
threat. It also ensures that the data is not accessible or vulnerable to attack from external
networks. It prevents unwanted actors from accessing the IoT network.
A good solution is to isolate the IoT devices from the rest of the network so that they are
all connected to the same one. By creating a separate network dedicated to your IoT devices, you
can safeguard your main network against IoT threats (Anderson, 2023).
Isolating IoT devices