6-2 Activity IT423 (1)
docx
keyboard_arrow_up
School
Southern New Hampshire University *
*We aren’t endorsed by this school
Course
423
Subject
Information Systems
Date
Dec 6, 2023
Type
docx
Pages
4
Uploaded by DeaconRoseBarracuda15
6-2 Activity: Errors in IoT Design
SNHU
IT 423: Computing as a Service
Paper Title in Bold at the Top of Page 2
Three errors I have identified in the architectural diagram are that all IoT devices are
running on the same single network, the second error is that the IoT devices are able to access the
internet using the wireless access point, and the third error is that there is no firewall to protect
the IoT devices from malicious attacks.
All the IoT devices are to blame for this error. The wireless access point connects all the
IOT devices to the workstations/devices, making each device vulnerable. Anyone without access
to this information can easily obtain sensitive information through this method. To protect all
data, this design error needs to be redesigned and a firewall should be implemented to keep the
workstations/devices data from the IoT devices. The firewall should be configured to block IoT
devices from accessing the workstations/devices. The system can continue to function without
addressing error, but it will be more vulnerable to attacks. The IoT devices can access
workstations/devices, which may contain sensitive and valuable data, without the firewall. To
prevent this, the firewall should be properly configured and monitored to ensure that all IoT
devices are blocked from connecting to the workstations/devices.
A router is the best solution to ensure all data can be protected on the IoT wireless
network and the workstation wireless network. The router should only allow access to IoT
devices and block access to the workstation network. This will stop data leaks from the IoT
network into the workstation network. By encrypting the IoT network's data, it addresses the CIA
threat. It also ensures that the data is not accessible or vulnerable to attack from external
networks. It prevents unwanted actors from accessing the IoT network.
A good solution is to isolate the IoT devices from the rest of the network so that they are
all connected to the same one. By creating a separate network dedicated to your IoT devices, you
can safeguard your main network against IoT threats (Anderson, 2023).
Isolating IoT devices
will ensure they are only connected to the devices they need to communicate with. This way, the
devices will not have access to the public internet, and threat actors will not be able to access the
data from the network. It provides a secure environment for data so there are no issues with
confidentiality, integrity, or availability.
To solve the problem of not having a firewall, it is a good idea to install and configure
one properly. A firewall is a network security device that keeps out unauthorized users and
hackers (Maxwell, 2022). It should be set to allow only the necessary traffic and block any other
traffic. This solution addresses issues with the CIA triad within the system by providing an extra
layer of protection. This makes it more difficult for attackers to gain access to the system and
reduces the risk of a data breach. Additionally, a firewall can detect and block unwanted traffic.
References
Anderson, M. (2023, July 17). 7 actionable tips to secure your smart home and IOT devices.
IEEE Computer Society. https://www.computer.org/publications/tech-news/trends/7-
actionable-tips-to-secure-your-smart-home-and-iot-devices
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Maxwell, J. (2022, February 7). 5 reasons why businesses need network firewall security. 9ine.
https://www.cm-alliance.com/cybersecurity-blog/5-reasons-why-businesses-need-
network-
firewall-security
For additional information on APA Style formatting, please consult the
APA Style Manual, 7th
Edition.