Assignment #1
docx
keyboard_arrow_up
School
Toronto Metropolitan University *
*We aren’t endorsed by this school
Course
CYBER SECU
Subject
Information Systems
Date
Feb 20, 2024
Type
docx
Pages
2
Uploaded by EarlResolveWolverine3228
Assignment #1
IoT
IoT is a future-facing development of the internet wherein objects and systems are embedded with
sensors and computing power, with the intention of being able to communicate with each other. IoT is
leading change within the digital landscape and it’s fast becoming the must-have element of business
technology.
IoT Smart Printers
Different ministries in Ontario Public Service are now using MFPs (multifunction peripherals) for print
services. MFPs are equipped with technology that enables the remote management of these devices.
Most devices can send automated alerts when service is necessary or when consumables, such as ink,
toner, or paper, need replenishment. IoT technology offers a range of smart printing benefits, including:
Operational efficiency - Remote device monitoring can reduce the need for routine maintenance
visits. Potential issues can be identified and fixed before they have an impact on the business. Improved service quality
- IoT machine-to-machine technology allows businesses to collect data
from devices and other assets that can be used to produce more accurate billing. It also allows businesses
to leverage proactive maintenance models rather than break/fix models, which only kick in once a
problem has been identified. Sustainability -
Real-time data can be collected and used to optimize energy usage for devices,
reducing an entire enterprises environmental impact. Figure 1 Source www.capitalmds.com
Cybersecurity Risks
While the IoT is entering daily life more and more, security risks pertaining to IoT are growing and are changing rapidly.
1
Assignment #1
Application Risk
-
As the MFPs devices are build by third party vendors and are accessible through
common platforms by different enterprises. apps developed or deployed by the organization to enable
access to corporate printing may contain security weaknesses and enable outsiders to access personal or
corporate data.
Bandwidth Consumption - Thousands of sensors, or actuators, trying to communicate to a single
server will create a flood of data traffic which can bring down the server. Additionally, most of the
sensors use an unencrypted link to communicate, and hence, there is a possibility of lag in the security.
Internet Printing Protocol (IPP) - Vulnerabilities in the Internet Printing Protocol (IPP) service,
allow a potential attacker to affect a Denial of Service (DoS) attack and perhaps even execute arbitrary
code on the device. The attack could potentially cause the machine to crash.
Privacy and data protection - The ability to add backdoors into printers to maintain attacker
persistence on a network, this enable the ability to spy on every print job sent to vulnerable printers, and
the ability to forward them to an external internet-based attacker compromising the privacy and
protection of data.
Risk Mitigation
All ministries need to in a state of readiness to deal with cyber attacks. That includes:
Defining and encompassing the organizations extended cybersecurity ecosystem, including
partners, suppliers, services and business networks.
Making sure vendors building security into the development so it’s therefore important that
vendors continue to invest in and improve cyber security, including secure development training
and carrying out thorough security assessments of all devices.
Ministries IT teams can also make small changes to safeguard their business from IoT-related
vulnerabilities, such as changing default settings, developing and enforcing secure printer
configuration guides and regularly updating firmware.
Ensuring that everyone in the organization understands the need for strong governance, user
controls and accountability.
Taking a cyber economic approach — understanding your vital assets and their value, and
investing specifically in their protection
References
https://www.ey.com/Publication/vwLUAssets/EY-cybersecurity-and-the-internet-of-
things/%24FILE/EY-cybersecurity-and-the-internet-of-things.pdf
https://www.nccgroup.trust/us/about-us/newsroom-and-events/blog/2019/august/the-cyber-risk-lurking-
in-your-office-corner/
https://www.capitalmds.com/iot-smart-printing/
1
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help