The Internet of Things – Module 2

  1. Home
  2. /
  3. Examples of Essays
  4. /
  5. The Internet of Things – Module 2

The Internet of Things – Module 2

Posted in : Examples of Essays on by : admin Comments:

1) Based on What You have Discovered so Far about the Internet of Things, Create a Table that Summarizes what You Consider to Be Six of the Most Significant Impact Areas of the IoT and for Each of the Six Identify a Primary Benefit and the Most Significant Potential Threat.

Impact Area Primary Potential Benefit Most Significant  Threat Comments
Automated traffic control Reduction in road traffic congestions and accidents reduction on all roads. Hacking of systems for malicious intentions. The invention can be interlinked with many other systems.
Security systems This increases security in homes and business premises by combating crime. Remote control is also possible. The systems are prone to malfunctions, cresting security breaches. Security systems need to be well synchronized with law enforcement systems for effective responses to threats.
Ventilation and air conditioning Control of room temperatures has helped individuals inhabit a wide variety of spaces without discomforts. The systems are prone to cyber-attacks by hackers, leading to malfunctioning. Big companies and hotels can gain significantly from this IoT.
Home appliances Easier control of every household appliance such as refrigerators, television’s, etcetera Most appliances are prone to malfunctioning, Home appliances have to be handled with care since they tend to be fragile
Industrialization The IoT in this field has enhanced processes of industries to be seamless and effective. Lack of proper updates software for systems, exposing them to security threats. Great advancements are still ongoing in this area.
Energy production More natural sources of energy are being exploited thus reducing pollution. The intelligent systems of small data are prone to malfunctions This area utilizes highly intelligent systems that analyze environmental conditions

 

2) What is the IoT? Explain and Give Two of Examples. Discuss some of the Pros and Cons of Establishing Connectivity between the IoT and the IIoT. What was the Author’s Position? Do you Agree or Disagree? Support Your Position.

Internet of Things is the link of devices in the physical world to the virtual internet through intelligent systems. The created systems get to interact and form massive intelligent systems that assess and control data and events in the environment. Industrial Internet of Things (IIoT) is the incorporation of IoT into industrial devices, allowing them to perform intelligent tasks just as other devices (Bradford, 2014). The industrial machines are fitted with IoT chipsets, interfaces, and software that allow them to operate as intelligent devices.  Examples of IIoT include the heating, ventilation and air conditioning (HVAC) devices, field devices that are operated via wireless connectivity, and manufacturing and assembly robotic devices in industries.

The interaction between the IoT and the IIoT has demonstrated both pros and cons. For some people, the use of small data on these outdated industrial devices is more of an irony. The bulkiness of the devices has been criticized by many developers and users due to the technological and cultural separation from the highly developed IoT (Bradford, 2014). They also argue that IIoT is not as intelligent as the IoT and is thus falling short of technological advancement. The traditional systems in the IIoT also make the setting up of security measure difficult as opposed to the IoT (EE Times, 2015). Despite these demeaning claims, the IIoT have continued to revolutionize the world of gadgets with novel inventions such as wireless field devices, simplified interfaces, smaller chipsets, and more interactive software (Bradford, 2014). Though Bradford (2014) expresses disdain for the IIoT, these devices are a green area for better inventions that can easily be tapped into. With the currents trends of internet connectivity, IIoT will be on the same level with the IoT in no time.

 

 

3) Find Two New Resources Dealing with the Internet of Things. They May Be Print or Video. For Each, Write an Abstract of the Article or Video Followed by a Section with Your Comments/Thoughts on What the Resource Has to Say.

Abstract for Source 1

Inventions have brought with them security hazards in the form of malware and malicious software. The IoT and IIoT interaction have offered technological advancements while increasing vulnerabilities to exploit weak firewalls. Devices installed with sensors are more prone to attacks by malware. The IoT enjoy a technological advantage over the IIoT since the latter utilize medieval cyber security models that are not tailored to cope with the sophisticated cyber crimes. Sources of threats are vast including URLs, internet protocols, user files and anonymous applications. The threats have necessitated daily interventions that will fight all newly modeled online threat. The article reviews new systems that are being employed to combat these internet threats, especially in the gaming community. Malware interruption techniques have also been studied in the article with the aim of securing internet gateways.

Discussion 1

The article identifies that old techniques of fighting cybercrime are cumbersome because there is the need for repeated updating of the system software (EE Times, 2015). Improved models like “the Webroot IoT Security Toolkit” offer a more comprehensive approach towards managing cyber threats of malware (EE Times, 2015). EE Times (2015) continues to note that even the internet sites that seem good may at times get corrupted. With this, a rapid check needs to be conducted on all sources that are a potential threat so as to protect users. Both the IoT and the IIoT will benefit from this toolkit.

 

 

Abstract for Source 2

The service industry has been in the line of fire amidst ongoing cybercrimes. Individuals’ personal information has suffered from unauthorized leaks to the public. Out there, this highly confidential information has been shown to have the ability to ruin reputations and personalities. Conventions and conferences are being held to address cyber security. More than ten gigabytes of data from a single entity can be breached and posted in dark websites. This article reviews the various sectors of the service industry which have fallen victim to the attacks including credit and debit card companies, health insurance agencies and online businesses. Emphasis has been laid on the type of data that is leaked.

Discussion 2

The author brings to our attention the soft spots that are being exploited by cyber criminals to exploit users. Health records, insurance companies, credit and debit card companies and online businesses are among the services that are being attacked (Max’s Cool Beans, 2015). All investors and scientists should pay keen attention to cybersecurity without trivializing the potential harm wielded by the hackers.

 

 

References

.Bradford, K. (2014, February 5). The Industrial Internet of Things. Forbes.

EE Times. (2015, October 1). New Technologies Secure the IoT & IIoT. EE Times.

Max’s Cool Beans. (2015, September 19). Cyber Security. EE Times.

 

 

 

Leave a Reply

Your email address will not be published. Required fields are marked *