I’m working on a computer science question and need guidance to help me understand better.Assignment: In your responses to your peers’ discussion posts:Determine whether you use the same technologies that your peers discussed or have never heard of those IoT technologies.
Discuss whether you agree or disagree with your peers’ ideas on threats and vulnerabilities posed by IoT technologies.
PEER POST # 1There are many threats we face in this new day of technology. It is getting easier and easier to hack into these technologies. Each day someone can create a virus or create a bug that can steal any personal information or manipulate devices so that you can get any information. Having a smart phone is one easy way that can be a major threat. In this era of time majority of people use smart phones to store personal information such as SS numbers, dob, address, etc. Adopting IoT devices can come with many risk for businesses such as accessing sensitive data. Devices that record, have access to, or stream sensitive data is one of the main challenges businesses have. Office equipment such as printers can be hacked and are potential access point. A compromised printer can mean that the hacker is able to view everything that is being printed or scanned.
PEER POST # 2When talking about using tech on a daily basis there are many different types of threat that we could face. These threats include identity theft, hacking and theft of personal property. Each time we access the web we are at risk of someone attacking us. With tech becoming more and more attached to our everyday lives there are more chances for cyber criminals to attack us. With our door locks, security systems, lights and thermostat criminal could hack our homes and possibly steal it. When talking about businesses they face many more threats such as ransomware attacks, loss of data, theft of money or loss of ideas. The bigger the company the bigger the target. That being said companies have to be careful to take in to account the technologies they bring in. The security teams will need to run risk analysis and take into account the chance of the tech being a vulnerability.
Requirements: 5-6 sentences each. 2 paragraphs total