he internet of things refers to a wide range of common technology devices (digital TV recorders, baby monitors, toys, appliances...) that have gained the ability to connect to computer networks such as the internet to add to their capabilities. These IoT devices represent increased information security risk due to a common failure to address the security consequences of their newfound connectivity. Suppose that the home assistant device (for example ’Amazon Echo’) used in an apartment complex experiences a cyberattack. Explain which of the general attack types (refer to your text) are possible, what assets are at risk, and how attacks would affect the confidentiality, integrity, and availability of the assets you identify.Be creative: note that information security attacks are often creative ways to find ’holes’ through protections and particular situations that have not been thought of previously.

Principles of Information Security (MindTap Course List)
6th Edition
ISBN:9781337102063
Author:Michael E. Whitman, Herbert J. Mattord
Publisher:Michael E. Whitman, Herbert J. Mattord
Chapter6: Security Technology: Access Controls, Firewalls, And Vpns
Section: Chapter Questions
Problem 15RQ
icon
Related questions
Question
100%

The internet of things refers to a wide range of common technology devices (digital TV recorders, baby monitors, toys, appliances...) that have gained the ability to connect to computer networks such as the internet to add to their capabilities. These IoT devices represent increased information security risk due to a common failure to address the security consequences of their newfound connectivity.

Suppose that the home assistant device (for example ’Amazon Echo’) used in an apartment complex experiences a cyberattack. Explain which of the general attack types (refer to your text) are possible, what assets are at risk, and how attacks would affect the confidentiality, integrity, and availability of the assets you identify.Be creative: note that information security attacks are often creative ways to find ’holes’ through protections and particular situations that have not been thought of previously. 

Expert Solution
steps

Step by step

Solved in 2 steps

Blurred answer
Knowledge Booster
Internet
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Similar questions
  • SEE MORE QUESTIONS
Recommended textbooks for you
Principles of Information Security (MindTap Cours…
Principles of Information Security (MindTap Cours…
Computer Science
ISBN:
9781337102063
Author:
Michael E. Whitman, Herbert J. Mattord
Publisher:
Cengage Learning