Question

In: Computer Science

Security concerns in Smart homes how to organize work of security investigators? define and portray the...

Security concerns in Smart homes

how to organize work of security investigators?
define and portray the attack surface?
which gatherings of people inside the association should be engaged with the investigation
what are the potential sources of data to focus on?
some possible sources of data in smart homes?
i want all the answers with in 500 words

Solutions

Expert Solution

Security concerns and attacks in smart homes:

An estimated 80% of IoT devices are unprotected to a wide range of attacks. Clearly, connecting traditionally stand-alone or independent smart devices such as lights, appliances and locks introduces numerous cyber security risks. Common cyber security threats and attacks against smart home devices include:

  1. Man-in-the-middle: An attacker breaches or breaks, interrupts or spoofs communications between the two systems. For example, fake or fraud temperature data generated by an environmental monitoring device can be spoofed or changed and forwarded to the cloud.
  2. Data and identity theft: Data generated by unprotected wearables and smart appliances provide cyber attackers with an ample amount of targeted personal information that can potentially be exploited for fraudulent transactions and identify theft.
  3. Device hijacking: The attacker hijacks and effectively assumes or accepts control of a device. These attacks are completely difficult to detect because the attacker does not change the basic functionality of the device. Moreover, it only takes one device to potentially re-infect all smart devices in the home.
  4. Distributed Denial of Service (DDoS): A denial-of-service attack attempts to provide a machine or network resource unavailable to its intended or targeted users by temporarily or indefinitely disrupting services of a host connected to the Internet.
  5. Permanent Denial of Service (PDoS):Permanent denial-of-service attacks (PDoS), also known as phlashing, is an attack that damages the device so badly that it requires replacement or reinstallation of hardware.

How to organize work of security investigators?

Securing Smart Homes:

Connected smart home devices should be protected by a complete IoT security solution such as device to cloud that does not disrupt or derange a Service provider or OEMs profitability or time to market.

1. Secure boot: Secure boot utilizes or uses cryptographic code signing techniques, make sure that a device only executes code generated by the device or another trusted party. By using of secure boot technology prevents hackers from replacing firmware with malicious or poisoness versions, thereby preventing attacks.

2. Mutual authentication: Every time a smart home device connects to the network it should be authenticated or verified before receiving or transmitting data. Cryptographic algorithms involving symmetric keys or asymmetric keys can be utilized or used for two-way authentication.

3. Secure communication (Encryption): Protecting data in transit between a device and its service infrastructure (the cloud). Encryption ensures that only those with a secret decryption key can access transmitted data.

4. Security monitoring and analysis: Captures oe express data on the overall state of the system, including endpoint devices and connectivity traffic. This data is then analyzed to detect possible security breaches or potential system threats. Once detected, a broad range of actions formulated in the context of an overall system security policy should be executed, such as quarantining devices based on anomalous behavior.

5. Security lifecycle management: The lifecycle management feature allows service providers and OEMs to control the security aspects of IoT devices when in operation. Rapid over the air (OTA) device key(s) replacement during cyber disaster recovery ensures minimal service disruption.

What are the potential sources of data to focus on? Some possible sources of data in smart homes?

1. Track consumer behaviour

2. Improve customer experience and engagement


Related Solutions

Topic: Security concerns in Smart homes how to organize work of security investigators? define and portray...
Topic: Security concerns in Smart homes how to organize work of security investigators? define and portray the attack surface? which gatherings of people inside the association should be engaged with the investigation what are the potential sources of data to focus on? some possible sources of data in smart homes? its an important question for my sem can u people help me as soon as possible
Define police corruption and how unethical/criminal behaviour by investigators can undermine public confidence and impact on...
Define police corruption and how unethical/criminal behaviour by investigators can undermine public confidence and impact on legitimacy of the police service. Discuss what impact this may have on investigations and how the police service can reduce the potential for corrupt and improper practice. 1000 words
How should the government weigh the tensions between political expression and national security concerns?
How should the government weigh the tensions between political expression and national security concerns?
The power and politics school of thought expresses concerns over how to define “power and politics.”...
The power and politics school of thought expresses concerns over how to define “power and politics.” Delineate the differences between the terms “power and politics.” What are the types of power found in public organizations? How is power achieved in the organization? How does power become authority? How may power and politics be balanced?
Answer the following questions regarding Social Security. Define Social Security. How exactly does paying into Social...
Answer the following questions regarding Social Security. Define Social Security. How exactly does paying into Social Security affect your retirement savings? c. Suppose you are 40 years old and plan on retiring in 25 years, and then living for another 15 years after retirement.  Your current income is $70,000 per year.  If you pay $3,000 in Social Security taxes each year, how much do you need to save per year in order to have enough to replace 75% of your preretirement income...
Define what a contingency is, describe the auditor's main concerns about them, and indicate how contingencies...
Define what a contingency is, describe the auditor's main concerns about them, and indicate how contingencies should be dealt with by management and the auditor. Besides litigation, claims, and assessments, what are some other types of contingencies?
How can staff preparation;Governence improve their work in nursing homes generally? And what are the plant...
How can staff preparation;Governence improve their work in nursing homes generally? And what are the plant operations and environment of care?
Define decentralized organizations and tell how they work and how they measure the performance of those...
Define decentralized organizations and tell how they work and how they measure the performance of those charged with management. Attention: Please answer in the form of paragraph, no bullet points or numerical and I will rate. Thank you in advance!
Define decentralized organizations and tell how they work and how they measure the performance of those...
Define decentralized organizations and tell how they work and how they measure the performance of those charged with management. Attention: Please answer in the form of paragraph, no bullet points or numerical and I will rate. Thank you in advance!
ESSAY QUESTIONS 8 Define the concepts of energy, work and power and explain how they are...
ESSAY QUESTIONS 8 Define the concepts of energy, work and power and explain how they are related. Provide an example of a conceptual physics problem that might involve all three factors.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT