Topic 5 DQ 1

.docx

School

Grand Canyon University *

*We aren’t endorsed by this school

Course

CYB-515

Subject

Information Systems

Date

Dec 6, 2023

Type

docx

Pages

1

Uploaded by jeffermine

Report
Smart devices can make life easier with their varied functionality at home and in the workplace, but their unsecured connection to the network can pose a significant threat if proper actions are not taken. Personally, I would advocate for the removal of most IoT devices from the workplace due to their limited security measures, however the inclusion of these devices in the modern workplace is inevitable. With that in mind, we should take the following steps to ensure that the security of the network isn't compromised. By utilizing segmentation, we can isolate the IoT devices from the rest of the devices/systems on the network by creating multiple layers of defense as fail safes. Devices will also be given a unique identification card to authenticate and give authorization to access specific systems so that they are not accessing components that they don’t need. IoT devices also need to have their network traffic monitored closely so that if it ever were to be compromised, swift action can be taken to mitigate any damage. This ties into the disaster recovery plan that needs to be in place so that all breaches can be addressed in a timely manner and that any damage done by an attack can be rectified. Lastly, it is important to keep the IoT devices up to date to keep potential attacks to a minimum. How to Control and Manage IoT Devices.. Reolink.com. https://reolink.com/blog/how-to-control-iot- devices/ What is IoT Device Management? - ServiceNow . (2023). Servicenow.com. https://www.servicenow.com/products/field-service-management/what-is-iot-device-management.html
Discover more documents: Sign up today!
Unlock a world of knowledge! Explore tailored content for a richer learning experience. Here's what you'll get:
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help