CS 410 8-1 Journal

docx

School

Southern New Hampshire University *

*We aren’t endorsed by this school

Course

410

Subject

Computer Science

Date

Jan 9, 2024

Type

docx

Pages

3

Uploaded by BailiffSpider1312

Report
Koehler Radder 06-21-2023 CS 410 8-1 Journal Reverse engineering can be used to improve cloud-based information technology systems because it involves inspecting the device and its components. This includes information gathering, pin identification, firmware image extraction, and dynamic analysis. Firmware images, which control a device's behavior, can reveal exploitable vulnerabilities. Reverse engineering processes can reveal that cracking an IoT device can lead to access to sensitive credentials and embedded private keys, potentially allowing hackers to gain remote access. The increasing demand for smart devices enables IoT research and development, enabling engineers to propose improvements and provide insights into cybersecurity risk management. Reverse engineering is used to patch cloud-based IT systems by identifying inefficiencies and vulnerabilities in data storage, encryption, and decryption key storage mechanisms before hackers do. This allows for improved solutions and implementation of additional layers of security. There is no single "silver bullet" for protecting complex cloud-based systems, but competition from cybersecurity vendors and specialists will continue to improve solutions. Third parties will use reverse engineering to research proprietary data and build effective protection. So many IoT devices are already infected with malware and many more are vulnerable to exploitation because of Unsecure communications in IoT. This poses significant risks, as third-
party interception can compromise sensitive information, such as user passwords and credit card numbers. Another problem is that Manufacturers must provide timely updates to address security risks on IoT devices, but many fail to do so, leaving them vulnerable to attacks from known flaws. Finally, Insufficient authentication hygiene in devices allows external and insider threats to access IoT endpoints and systems. Reverse engineering improves emerging devices' safety and cybersecurity risk management by presenting theoretical attacks based on historical data. I believe that IoT gadgets, such as smart watches, smart refrigerators, and smart home security systems pose a significant and potentially dangerous threat. Ransomware can cause home security systems to shut down. Cyberattacks on individual homes could lead to continuous access to personal data or theft in a more physical sense. As technology advances, so do crimes and perpetrators. To address this threat, big corporations should engage in reverse engineering to uncover real-time threats that may be directed at consumers.
References: Reverse Engineering is One of Your Best Weapons in the Fight Against Cyberattacks -- Security Today. (2022). Security Today. https://securitytoday.com/Articles/2019/02/26/Reverse- Engineering-Is-One-of-Your-Best-Weapons-in-the-Fight-Against-Cyberattacks.aspx?Page=2 Top IoT Security Risks and Vulnerabilities and How to…. (n.d.). BeyondTrust. Retrieved June 21, 2023, from https://www.beyondtrust.com/blog/entry/top-iot-security- vulnerabilities#:~:text=Lack%20of%20IoT%20Security%20Updates&text=However%2C %20many%20IoT%20%2F%20IIoT%20manufacturers What You Should Know About Reverse Engineering IoT Devices. (n.d.). What You Should Know about Reverse Engineering IoT Devices. Retrieved June 21, 2023, from https://www.redalertlabs.com/blog/what-you-should-know-about-reverse-engineering-iot- devices#:~:text=Through%20the%20reverse%20engineering%20process
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help