The security issues related to IoE and overcoming them
The technology market is has seen diverse innovation to suit various trends and advancements in the market. However, certain risks are being experienced by the users of gadgets being produced ( Joshi, 2019). Cybercriminals are able to use several attacks on the Internet of Everything, and they include:
- Sniffer Attack; it involves accessing unencrypted information conveyed in a network using a program known as a sniffer.
- Compromised-key Attack; it involves stealing key used for encrypted data and using the key to decode the data that is encrypted.
- Man-in-the-Middle Attack; there is involvement of a third party in this attack, which steals transmitted data between two devices or people.
- Password-Based Attack; the attack access a network or device or both which are connected to a certain network by stealing or guessing the password.
- Denial of Service Attack; is used to slow down or prevent the usage of certain devices or networks.
Despite the presence of these attacks, there are several ways they can be avoided or minimized. The first remedy entails enabling all the security features that are present in any technological device. The features are often provided by several manufacturers to ensure a high level of security, and it is essential to use them efficiently. It is also vital to purchase IoE-enabled products from firms that update the product firmware on a regular basis. The firmware being rolled out tend to be inherent to any system, and the process of updates from its vendors patches up insecurity levels.
The second technique involves the usage of protected passwords. Good passcodes are supposed to have intricate combinations of alphanumeric typeset, which include mathematical symbols, punctuation marks, letters, and numbers. These passwords use both lower and upper-case letters. Each IoE device is supposed to have its password, which is changed after a varied period of time. Having basic information about the product and manufacturer serves a good purpose in avoiding IoE attacks since there is in-depth information on both the product and firm market reviews.
- Capabilities that a redirector has
The redirector often avails mechanisms for locating deleting, writing, opening, and reading files. It has a file system that interacts with the I/O system, Cache Manager, Object Manager, and memory manager to be able to integrate files that are remote to the operating system. Therefore it enables, necessary information is sent over a network of a remote file server after the request of a client application via the I/O manager (Microsoft, 2017). On the other hand, a redirector is supposed to receive responses from the remote file server that is passed through a client I/O manager.
A redirector is supposed to provide calls or remote access to the communication mechanism to the service implementing its network protocol or user-mode application. Redirectors often rely on the Transport Driver Interface to implement network communication, which calls the network protocol task (Microsoft, 2017). Thirdly, a redirector opens room for application such as mailslots and named pipes. It also gives a platform for the Presentation layer and Application layer of the OSI to function efficiently. Several registry entries are supposed to be created by a proper functioning redirector, and this includes providing options for installing and uninstalling applications that are not needed. Lastly, problems are supposed to be troubleshot by a network redirector, and this also helps to secure data. Don't use plagiarised sources.Get your custom essay just from $11/page
- Compare and contrast RMON with SNMP
The Simple Network Management Protocol (SNMP) is situated in the application sheet, and it comprises parts of the Internet Protocol/ Transmission Control Protocol (IP/TCP) network design. On the other hand, Remote monitoring (RMON) ensures that several console systems and network monitors exchange data on network monitoring. The SNMP uses a different information model known as SMI from the Management Information Base model used by RMON (Panday, 2015). SNMP gathers the information that has little impact on operations and makes it the first option for information retrieval in a network.
RMON is complex since its functions are found in the RMON MIB modules. On the other hand, SNMP uses operation attributes and notifications. The differences also arise on the number of support operations; SNMP supports only five operations while RNMON1 MIB has ten groups with RMON2 listing ten additional groups. RMON also has the ability to use backup solutions, and antivirus while SNMP uses a community name that is not encrypted. The backup solutions and Antivirus in RMON are able to set several thresholds for a network that gives alerts and traps during faults experience in a network.
- Key elements of NOC that serve a hospital
A network operation forms a foundation that supports an entire organization structure. In the modern era, a network operation center needs to run smoothly and be reliable for the element of continuity. Therefore, several hospitals have Network Operations Center that deals with both basic and complex responses in the organization, according to Panda (2017). There are essential elements that are supposed to be present while setting up a Network Operation Center in a hospital and they include;
- Centralization of Knowledge; all knowledge and information are supposed to be stored at a centralized place that hospital staff members can access. The Network Operations Center of a hospital is supposed to be fluid in its function and always up to date lessons learned to avoid the same mistakes happening in the future.
- Incident Tracking via a Ticket System; usage of a ticket tracking system by a hospital’s Network Operations Center ensures that tasks are kept in order by severity, urgency, and people respond to tasked with specific matters. A ticket system allows several tasks that cannot be completed by a single department such as laboratories forwarded to the next department, such as wards in a hospital.
- Monthly and daily reports measuring improvement progress and incident severity; a Network Operations Center in a hospital is supposed to draw analysis and reports on a daily and monthly basis. These reports help the Network Operations’ management team in a hospital to track the progress and development of the system. The trends can show the hospital in key areas they are performing well and dismally.
- IT process Automation; time is saved in a hospital when certain daily tasks are automated, and it also enhances workflow. Staff in a hospital are freed to concentrate on more valuable activities that pertain to saving lives since certain functions can be handled remotely.
- Monitoring; a Network Operations Center has two processes of monitoring, which are infrastructural and user experience monitoring. Infrastructural monitoring helps to protect the entire system from several threats through early detection. User experience monitoring problems and finding solutions that are based on the user’s behavior and activities.
- Impact of 5G
The network revolution has had a mega contribution to digital transformation on health, consumer products, and the auto industry. It is because it has the potential of carrying and receiving numerous numbers of connections at a fast speed (Pasard and Rao, 2015). In the health care sector, several data can be transferred at instantaneous speed. There are has been a change in wearable technology and remote monitoring of patients in a sector that requires a huge bandwidth. Various huge medical data files are able to be at a quick and reliable pace improving the level of quality health care. Various high-quality videos can be transmitted at a fast speed.
Auto and consumer product industry success is based on positive consumer response. The presence of individualized shopping is currently taking the forefront, and the young generation is majority users. Several organizations are using demographics that have concentrated on increasing their sales using 5G networks since they connect to their clients and customers efficiently, and this leads to an increase in sales and positive reviews. Presences of several online markets such as Alibaba have been hugely boosted by 5G innovations since orders and transactions are made at an increased rate, which translates to increased sales and revenue.
- Role of QoS in the net neutrality debate
Internet is often treated as a communal utility, and people who use it are handed the right of accessing the information they chose at their favorable time and span (Koukoutsidis, 2015). However, it is not in the same interests as the present interests of net neutrality safeguards taken by several nations around the globe. The Quality of Service plays a critical role on the internet, and the World Wide Web and its role in measurement in net neutrality have sparked the debate. Several tools have been developed after net neutrality violations have been violated to perform this task automatically.
Quality of Service measurement is able to measure the speed of the internet being provided internet and World Wide Web users. The common tools used in the process of safeguarding and measurement of net neutrality include NANO, Shaperphrobe, and Glasnost (Koukoutsidis, 2015. These tools differ from each other despite the presence of measurement parameters that harmonize them. However, there are several groups of people who complain about the value offered by the measurement tools despite their proliferation. Several complain about the tools being ineffective on broadband speed and several cases of delay. The presence of a toolbox by Quality of Service is the new advancement to help monitor evolution since it can be applied at any time.
- Mobile QoS and network QoS contrast and comparison
Quality of Service mechanisms is used to enhance and control the usability and reliability of telephony or network service. The measurement of these services is based on responses from its users. Certain features of the network are used to help in quantitative measurement, and they include availability, jitter, bit rate, and packet loss (Microsoft, 2015). Computer networking and telecommunication network have a similar reference to Quality of service, which means the reservation of resources and prioritization of traffic to achieve and improve the quality of service being rendered. According to Mioa (2015), mobile cellular service providers give mobile Quality of Service to their users, similar to Internet Service providers.
Mobile Quality of Service enhances activities such as phone calls that can be interrupted by handovers when a new system is overloaded. On the other hand, in computer networking, Quality of Service, different users, applications, and data flow are guaranteed a specific level for data flow. Mobile network service is effective, unlike network quality service, because it has limited network capacity. Despite several differences, Quality of Service helps both mobile and internet service providers an easy way of transporting traffic, such as preferring voice to IP technology. It helps both telephone and computer networks be useful in audio conversations.
- Five questions a cloud service provider
Some inquiries can be asked to a cloud service provider, and these are the top questions;
- Is the business data critical?
An organization is supposed to consider the vitality of information it chooses to store out of its data center. Having information about data exposure fitting to the organization’s business cycle and the presence of the third party are supposed to be cleared.
- What is the bandwidth?
Placing storage systems and supplication servers outside the data center saves the organization substantial money since the infrastructural cost is cut. On the other hand, an organization needs to increase its external connectivity, which involves analysis of present use, costs, and future changes.
- What if there is a shift in mind?
There are several periods in an organization where the benefits of cloud services are not delivered. Also, several changes in a firm might lead to an organization’s re-thinking of cloud services. Therefore, an organization needs to know ways of retrieving data back to its servers.
- What are the cloud provider’s security policies and procedures?
Data security is critical in the existence of any organization rereading, and agreement is not enough. Having information about the service provider security policies and procedures is advantageous. An organization can also use independent audit reports.
- What information is received when the service contract comply?
Monitoring performance, such as system availability and server speed, is important. Therefore, an organization is supposed to have information about their ability to extend monitoring services.
- Emerging Technology and Its Impact
Cloud computing has been a center point of numerous projects being planned an actualized. It is a remote server platform that’s stores information and helps in the execution of applications. In the presence of a simple internet connection, an organization can be able to run data and services online using simple requests. The concept surrounding cloud computing is forwarding processed data to an external infrastructure that saves costs (Guersan, 2017). These features have been helpful to several organizations since it saves time and cost of installing softwares on every company’s server.
An organization is able to access resources such as data and applications while using cloud computing services. It is one of the greatest advantages of cloud computing services since this information can be accessed any time from any device as long as the devices have interment connection. Information cannot be lost when calamities such as fires and burglary strike a company since information on locally stored. Information can be automatically be backed up by cloud computing services when an organization server fails.
According to Guersan (2017), primary services such as emails and calendar services have hugely been assisted by this advancement. The service is flexible and can be bent anytime with respect to an organization’s needs. The other advantage in an organization is that colleagues can work on a single document with the presence of optimized security levels.
- The migration from IPV4 to IPV6
The presence of a transition that is complete from IPV4 to IPV6 is difficult because of backward incompatibility. The process is different from the construction of new technologies where the new one is backwardly compatible with the old system (Houston, 2015). IPV6 provides several seamless features that make it powerful compared to IPV4. However, IPV4 is standard compared to IPV6, making it be used in several internet architectures leading to the demand for the transition to IPV6 from IPV4. Several techniques have cropped, such as Classes Inter-Domain and Network Adress Translation, to avoid the transitions.
The presence of a Network Address Translation came to existence in the early 1990s because of address exhaustion (Houston, 2015). Its unit is placed on the edge to allow several end gadgets to share an exterior universal address. The NAP has the potential of using both IPV4 and IPV6 packets conversely in a double rooter device. The presence of a network address system has helped to gap various loops that were being experienced by IPV6. On the other hand, Classless Inter-Domain Routing tackles the problem of unused address spaces since it provides a new network address in routers that is flexible. Aggregation of several networks within one network makes Classless Inter-Domain Routing to be termed as supernetting.
References
(Microsoft TechNet, 2014) “Quality of Service.”
(Microsoft, 2017) Basic Architecture of a Network Redirector. Microsoft
(Treadmicro.com, 2015) “Possible attacks and how to prevent them.”
Houston, J. (2015) “The Internet in Transition: The State of the Transition to IPv6 in Today’s Internet and Measures to Support the Continued Use of IPv4.”
Joshi, N. (2019) “8 types of security threats on internet of things.”
Koukoutsidis, I., (2015) “Public QoS and Net Neutrality Measurements: Current Status and Challenges Toward Exploitable Results.” Penn State University Press
Mioa, G., Zander, J.,Sung, K., i., Slimane, B., (2016). Fundamentals of Mobile Data Networks. Cambridge University Press
Panda, A., (2017) “Comparison of RMON and SNMP.”
Prasard. R., Rao., S., K. (2015) “Impact of 5G technologies.”
Rotolo, D., Hicks, D., Martin, B. R. (2015) “What is an emerging technology? Research Policy.”