Important Notice:

Course Content
Security and future of IoT Ecosystem (Chapter-5) M4-R5.1
About Lesson

Difficult to Encrypt:-

                     IoT Device Basically single purpose वाले कंप्यूटर होते हैं जो बहुत सारी मेमोरी या प्रोसेसिंग पावर के बिना बनाये जाते हैं जो कमजोर हार्डवेयर पर चलते हैं इसलिए इन डिवाइसों को कई अलग-अलग प्रकार के Attack के लिए आसान बनाता है।

Lack of Experience:-

                IoT के क्षेत्र में कई inexperienced manufactures आ रहे हैं IoT Device traditional software की तुलना में प्रोग्राम के लिए अधिक Challenging हैं  

Lack of Standards:-

               NIST (National Institute of Standards and Technology) और IoTSF ( Internet of Things Security Foundation) जैसे संगठन आधारभूत Security standards को विकसित करने पर काम कर रहे हैं, लेकिन ये अभी पूरे नहीं हुए हैं।

Third party IoT vulnerabilities:-

                  IoT security में मुख्य issue में से एक communication capabilities, cryptographic capabilities, operating system आदि के लिए Third party के components पर IoT डिवाइस पर बहुत अधिक निर्भर है।

 

Difficult to Encrypt:-

                 IoT devices are basically single purpose computers that are built without a lot of memory or processing power that run on weak hardware therefore making these devices vulnerable to many different types of attacks.

Lack of Experience:-

                Many inexperienced manufactures are coming into the field of IoT. IoT devices are more challenging to program than traditional software.

Lack of Standards:-

                  Organizations such as NIST (National Institute of Standards and Technology) and IoTSF (Internet of Things Security Foundation) are working on developing basic security standards, but these are not yet complete.

Third party IoT vulnerabilities:-

                      One of the main issues in IoT security is the heavy dependence of IoT devices on third party components for communication capabilities, cryptographic capabilities, operating system, etc.

error: Content is protected !!