Cyber-security in IoT Cloud computing
Introduction
Internet of Things (IoT) deals with how network devices communicate with each other. The number of tools that uses the Internet of Things (IoT) has been on the rise with manufacturers’ preference to put the Internet of Things (IoT) on gadgets such as light bulbs, cars, refrigerators, among others. Cloud computing is a network technology that tries to solve the security vulnerabilities of the Internet of Things (IoT) through logging, timestamps, and other user accounts activities. The provision of user accounts for specific individuals in, and organization is a step towards hardening security in the Internet of Things. The cloud computing runs in a more anonymous platform where one cannot tell where the data is stored or who controls and protects the information systems (Carstensen et al., 2012).
Nevertheless, the Internet of Things (IoT) has not matured yet, and this makes it not entirely safe, according to Reuvid (2018). The entire Internet of Things environment from the users and manufacturers is still coupled with numerous security challenges identified in update management, manufacturers’ standards, users’ awareness, knowledge, and physical hardening (Kahana, 2018). Interestingly, the primary source of the Internet of Things security issues originates from the manufacturers that do not spend adequate time on security resources.
Problem Statement
In this dissertation, the problem that will be addressed in this study of how to fortify data security in cloud servers to reduce cyber-crime associated with data theft. Cybercrimes in cloud computing are rampant due to the nature of cloud servers and service providers. Cloud service providers work to provide space for backing up data but hire third-party companies to secure servers due to the vast nature of the information stored in the cloud (D’Agostino, 2019). The service providers and the clients enhance data security in cloud computing through contractual agreements with other security providers. The dissertation seeks to evaluate the risks of data stored in the cloud and improve data security.
References
Reuvid, J. (Ed.). (, 2018). Managing Cybersecurity Risk: Cases Studies and Solutions. Legend Press Ltd.
Kahana, E. (2018). Rise of the Intelligent Information Brokers: Role of Computational Law Applications in Administering the Dynamic Cybersecurity Threat Surface in IoT. Minn. JL Sci. & Tech., 19, 337.
D’Agostino, G. (2019). Data Security in Cloud Computing, Volume I. Momentum Press.
Carstensen, J., Morgenthal, J. P., & Golden, B. (2012). Cloud computing: Assessing the risks. It Governance Ltd.