CSIA 459 week 2 discussion

.docx

School

University of Maryland, University College *

*We aren’t endorsed by this school

Course

459

Subject

Information Systems

Date

Jan 9, 2024

Type

docx

Pages

2

Uploaded by libdon4life

Report
Kparkay Alvin Togba CSIA 459 Week 2: Consumer Tech & Cyber Risks Our homes and workplaces are becoming increasingly smarter, and the use of smart devices plays a vital role in the advancement of technology. It is our responsibility as users of such devices to understand the risks they pose and to avoid them as much as possible. Despite the positive aspects of using smart devices, there are still some risks associated with them, despite the positive aspects of their use. A few of these problems include potential malfunctions as well as vulnerabilities in security (Guzman & Gupta, 2017). An analysis A summary of the three articles As Tonya Riley discusses in her first article, there are still a number of security flaws that exist in the market for smart home devices. A variety of security flaws have been found in the products of Geeni and Merkury Innovations, the parent company of Geeni, in the article described in this article. According to (Riley, 2021) it is possible for unauthorized individuals to control or download files or audio through these flaws. There has been an issue with Nest cameras made by Google that have been reported to have several bugs that may allow unauthorized individuals access to the cameras without their permission. As a result of over 12,000 cyber-attacks in one week, James Coker of Tittle gives an overview of his experience. It should be noted that many of these attacks targeted smart devices, such as Amazon's wireless camera. Other victims of this attack included smart TVs and printers made by Samsung and other companies (Coker, 2021). The third article in this series of articles from Ziv Chang discusses the threats and scenarios that can occur when IoT devices are connected to the Internet. As mentioned in the article, certain appliances in the home can be compromised by hackers. Smart toilets, smart locks, and intelligent speakers are just some of the examples of these products (CHANG, 2019). From the articles, here are some themes. There are a number of people who are concerned about the level of vulnerability that they expose themselves to when it comes to using smart devices. In the event that your device has a vulnerability, unauthorized individuals may be able to access it without your knowledge and without your consent. When intelligent locks are used at office and home entry points, it can be possible for unauthorized individuals to gain access to premises (Guzman & Gupta, 2017). A vulnerability in smart speakers can also be exploited in order to gain access to sensitive information. Due to this vulnerability, hackers can access the device's microphone and listen to its surroundings through the device's microphone. Using a smart camera, a hacker can download videos and audio recordings that have been captured. The
camera can be disabled completely or be restricted from being accessed by other users by a hacker. Moreover, a hacker is also capable of modifying the expiration dates on food products as well as taking control of kitchen appliances by hacking them. It is important to consider a wide range of risks that come along with the use of smart devices both at home and at work. There is a strong recommendation that users install a firewall in their homes or offices if they wish to reduce the risks associated with the use of such devices (Guzman and Gupta, 2017). By using a firewall, you will be able to prevent hackers from being able to gain access to the system and infect it with malware. To ensure their wireless networks are secure, users should also take the necessary steps to ensure that their wireless networks are protected from hackers by making sure they have secure wireless networks. Conclusion It has become increasingly common for people to use smart devices, but despite this, there are still many concerns that arise from these devices. A concern that many people have when it comes to smart devices is the fact that they are vulnerable, which is one of the main concerns that they have. It has been reported that there are a wide range of vulnerabilities which can be exploited by anyone in order to gain access to a device, according to Gupta and Guzman (2017). The best way to minimize the risk of being exploited by a hacker when using a smart device is to use a strong password encryption and a firewall while using it. It is of the utmost importance that you change the passwords of your smart devices on a regular basis in order to keep your smart devices secure. References CHANG, Z. (2019). Inside the Smart Home: IoT Device Threats and Attack Scenarios. Retrieved 29March 2022, from https://www.trendmicro.com/vinfo/fr/security/news/internet-of-things/inside-the-smart- home-iot-device-threats-and-attack-scenarios Coker, J. (2021). Smart Home Experiences Over 12,000 Cyber-Attacks in a Week. Retrieved 29 March2022, from https://www.infosecurity-magazine.com/news/smart-home-experiences-cyber/ Guzman, A., & Gupta, A. (2017). IoT Penetration Testing Cookbook: Identify vulnerabilities and secure your smart devices. Packet Publishing Ltd. Riley, T. (2021). The Cybersecurity 202: Smart home devices with known security flaws are still on the market, researchers say. Retrieved 29 March 2022, from https://www.washingtonpost.com/politics/2021/02/04/cybersecurity-202-smart-home-devices-with- known-security-flaws-are-still-market-researchers-say/
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help