Security Challenges with the Commercialization of the Internet of Things
McGuire, Daniel, Sean
Cardiff Metropolitan University
MetadataShow full item record
The Internet of Things is a rapidly expanding technological architecture that is paving the way for a more connected and smarter lifestyle. It allows many connected devices to exchange data automatically with one other, with the cloud providing users with real time analytical data. The vast number of these “Things” has had a massive impact on the security and privacy of all parties involved. Regulation and an enforceable legal framework must be put into place to ensure the security and privacy of all involved. This is of the upmost importance while taking the technology into consideration and putting barriers on its inevitable evolution. Measures must be put into place to ensure devices already in use are protected, with new devices that are introduced are more secure than their older counterparts. Future research and testing should be carried out to ensure that laws or regulations introduced do not affect the evolution of IoT. The manufactures or companies behind IoT devices should simultaneously improve the security for all parties involved.
Showing items related by title, author, subject and abstract.
THE FACTORS THAT INFLUENCE ONTOLOGICAL SECURITY, LINKED SPECIFICALLY TO THE COACH-ATHLETE RELATIONSHIP: AN AUTO-ETHNOGRAPHIC STUDY OF CRICKET COACHING Eccleshare, James (University of Wales Institute Cardiff, 2011-03-15)The primary purpose of this study is to examine the notion of ontological security within the coach athlete relationship. Previous research has highlighted the necessity to develop a trusting and secure environment for ...
The factors that influence ontological security, linked specifically to the coach-athlete relationship: an auto-ethnographic study of cricket coaching Eccleshare, James (University of Wales, 2011)The primary purpose of this study is to examine the notion of ontological security within the coach athlete relationship. Previous research has highlighted the necessity to develop a trusting and secure environment for ...
Rahim, Mohammad Rafie (Cardiff Metropolitan University, 2016-04)Abstract Biometric authentication systems use physical traits of a user in order to give the user access control. Previously the most common and widely method of securing access control is done via knowledge based ...