Assignment #1

docx

School

Toronto Metropolitan University *

*We aren’t endorsed by this school

Course

CYBER SECU

Subject

Information Systems

Date

Feb 20, 2024

Type

docx

Pages

2

Uploaded by EarlResolveWolverine3228

Report
Assignment #1 IoT IoT is a future-facing development of the internet wherein objects and systems are embedded with sensors and computing power, with the intention of being able to communicate with each other. IoT is leading change within the digital landscape and it’s fast becoming the must-have element of business technology. IoT Smart Printers Different ministries in Ontario Public Service are now using MFPs (multifunction peripherals) for print services. MFPs are equipped with technology that enables the remote management of these devices. Most devices can send automated alerts when service is necessary or when consumables, such as ink, toner, or paper, need replenishment. IoT technology offers a range of smart printing benefits, including: Operational efficiency - Remote device monitoring can reduce the need for routine maintenance visits. Potential issues can be identified and fixed before they have an impact on the business. Improved service quality - IoT machine-to-machine technology allows businesses to collect data from devices and other assets that can be used to produce more accurate billing. It also allows businesses to leverage proactive maintenance models rather than break/fix models, which only kick in once a problem has been identified. Sustainability - Real-time data can be collected and used to optimize energy usage for devices, reducing an entire enterprises environmental impact. Figure 1 Source www.capitalmds.com Cybersecurity Risks While the IoT is entering daily life more and more, security risks pertaining to IoT are growing and are changing rapidly. 1
Assignment #1 Application Risk - As the MFPs devices are build by third party vendors and are accessible through common platforms by different enterprises. apps developed or deployed by the organization to enable access to corporate printing may contain security weaknesses and enable outsiders to access personal or corporate data. Bandwidth Consumption - Thousands of sensors, or actuators, trying to communicate to a single server will create a flood of data traffic which can bring down the server. Additionally, most of the sensors use an unencrypted link to communicate, and hence, there is a possibility of lag in the security. Internet Printing Protocol (IPP) - Vulnerabilities in the Internet Printing Protocol (IPP) service, allow a potential attacker to affect a Denial of Service (DoS) attack and perhaps even execute arbitrary code on the device. The attack could potentially cause the machine to crash. Privacy and data protection - The ability to add backdoors into printers to maintain attacker persistence on a network, this enable the ability to spy on every print job sent to vulnerable printers, and the ability to forward them to an external internet-based attacker compromising the privacy and protection of data. Risk Mitigation All ministries need to in a state of readiness to deal with cyber attacks. That includes: Defining and encompassing the organizations extended cybersecurity ecosystem, including partners, suppliers, services and business networks. Making sure vendors building security into the development so it’s therefore important that vendors continue to invest in and improve cyber security, including secure development training and carrying out thorough security assessments of all devices. Ministries IT teams can also make small changes to safeguard their business from IoT-related vulnerabilities, such as changing default settings, developing and enforcing secure printer configuration guides and regularly updating firmware. Ensuring that everyone in the organization understands the need for strong governance, user controls and accountability. Taking a cyber economic approach — understanding your vital assets and their value, and investing specifically in their protection References https://www.ey.com/Publication/vwLUAssets/EY-cybersecurity-and-the-internet-of- things/%24FILE/EY-cybersecurity-and-the-internet-of-things.pdf https://www.nccgroup.trust/us/about-us/newsroom-and-events/blog/2019/august/the-cyber-risk-lurking- in-your-office-corner/ https://www.capitalmds.com/iot-smart-printing/ 1
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help