6-2 Activity IT423 (1)

.docx

School

Southern New Hampshire University *

*We aren’t endorsed by this school

Course

423

Subject

Information Systems

Date

Dec 6, 2023

Type

docx

Pages

4

Uploaded by DeaconRoseBarracuda15

Report
6-2 Activity: Errors in IoT Design SNHU IT 423: Computing as a Service
Paper Title in Bold at the Top of Page 2 Three errors I have identified in the architectural diagram are that all IoT devices are running on the same single network, the second error is that the IoT devices are able to access the internet using the wireless access point, and the third error is that there is no firewall to protect the IoT devices from malicious attacks. All the IoT devices are to blame for this error. The wireless access point connects all the IOT devices to the workstations/devices, making each device vulnerable. Anyone without access to this information can easily obtain sensitive information through this method. To protect all data, this design error needs to be redesigned and a firewall should be implemented to keep the workstations/devices data from the IoT devices. The firewall should be configured to block IoT devices from accessing the workstations/devices. The system can continue to function without addressing error, but it will be more vulnerable to attacks. The IoT devices can access workstations/devices, which may contain sensitive and valuable data, without the firewall. To prevent this, the firewall should be properly configured and monitored to ensure that all IoT devices are blocked from connecting to the workstations/devices. A router is the best solution to ensure all data can be protected on the IoT wireless network and the workstation wireless network. The router should only allow access to IoT devices and block access to the workstation network. This will stop data leaks from the IoT network into the workstation network. By encrypting the IoT network's data, it addresses the CIA threat. It also ensures that the data is not accessible or vulnerable to attack from external networks. It prevents unwanted actors from accessing the IoT network. A good solution is to isolate the IoT devices from the rest of the network so that they are all connected to the same one. By creating a separate network dedicated to your IoT devices, you can safeguard your main network against IoT threats (Anderson, 2023). Isolating IoT devices
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help