This essay has been submitted by a student. This is not an example of the work written by professional essay writers.
Uncategorized

Cyber-security in IoT Cloud computing

Pssst… we can write an original essay just for you.

Any subject. Any type of essay. We’ll even meet a 3-hour deadline.

GET YOUR PRICE

writers online

Cyber-security in IoT Cloud computing

Introduction

Internet of Things (IoT) deals with how network devices communicate with each other. The number of tools that uses the Internet of Things (IoT) has been on the rise with manufacturers’ preference to put the Internet of Things (IoT) on gadgets such as light bulbs, cars, refrigerators, among others. Cloud computing is a network technology that tries to solve the security vulnerabilities of the Internet of Things (IoT) through logging, timestamps, and other user accounts activities. The provision of user accounts for specific individuals in, and organization is a step towards hardening security in the Internet of Things. The cloud computing runs in a more anonymous platform where one cannot tell where the data is stored or who controls and protects the information systems (Carstensen et al., 2012).

Nevertheless, the Internet of Things (IoT) has not matured yet, and this makes it not entirely safe, according to Reuvid (2018). The entire Internet of Things environment from the users and manufacturers is still coupled with numerous security challenges identified in update management, manufacturers’ standards, users’ awareness, knowledge, and physical hardening (Kahana, 2018). Interestingly, the primary source of the Internet of Things security issues originates from the manufacturers that do not spend adequate time on security resources.

Problem Statement 

In this dissertation, the problem that will be addressed in this study of how to fortify data security in cloud servers to reduce cyber-crime associated with data theft. Cybercrimes in cloud computing are rampant due to the nature of cloud servers and service providers. Cloud service providers work to provide space for backing up data but hire third-party companies to secure servers due to the vast nature of the information stored in the cloud (D’Agostino, 2019). The service providers and the clients enhance data security in cloud computing through contractual agreements with other security providers. The dissertation seeks to evaluate the risks of data stored in the cloud and improve data security.

 

References

Reuvid, J. (Ed.). (, 2018). Managing Cybersecurity Risk: Cases Studies and Solutions. Legend Press Ltd.

Kahana, E. (2018). Rise of the Intelligent Information Brokers: Role of Computational Law Applications in Administering the Dynamic Cybersecurity Threat Surface in IoT. Minn. JL Sci. & Tech.19, 337.

D’Agostino, G. (2019). Data Security in Cloud Computing, Volume I. Momentum Press.

Carstensen, J., Morgenthal, J. P., & Golden, B. (2012). Cloud computing: Assessing the risks. It Governance Ltd.

 

  Remember! This is just a sample.

Save time and get your custom paper from our expert writers

 Get started in just 3 minutes
 Sit back relax and leave the writing to us
 Sources and citations are provided
 100% Plagiarism free
error: Content is protected !!
×
Hi, my name is Jenn 👋

In case you can’t find a sample example, our professional writers are ready to help you with writing your own paper. All you need to do is fill out a short form and submit an order

Check Out the Form
Need Help?
Dont be shy to ask