Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Please respond to the below post with some advice about how to strengthen their legal and/or ethical ideas The national business cybersecurity concerns about the

Please respond to the below post with some advice about how to strengthen their legal and/or ethical ideas

The national business cybersecurity concerns about the use of Internet of Things (IoT) are real. In fact, with Internet of Things (IoT) everything we enjoy in the comforts of our daily life becomes a computer, simple things such as light bulbs, thermostat, cameras, appliances, cars, scales, wearable apple devices, Alexa, Amazon echo and more. All these devices hold a large amount of the owner Personal Identifiable Information (PII), such as full name, date of birth, home address, email address, phone number and more, and are vulnerable to cyber-espionage.

The user privacy is a stake for each device used, the safety of the user is at risk when the IoT connects the human body to a network, and the liability of the user is at danger when the user's IoT experience a Denial Of Service (DOS) attacks may negatively affect a third-party device (I. T., 2023). IoT can inadvertently share our private information from our closed doors to unknown cybercriminals, for example wearable smart devices often used to track body movements, sleep habits, exercise routine, strengths and weaknesses or our bodies, time spent at home or outside, can also be the means for a malicious hacker to retrieve this private information.

IBM Cyber Engineer Jeff Crume advises to secure credentials on each IoT device, the Wi-Fi and network with strong passwords, biometrics or two authentication factors. Crume also recommends a separate network for all IoTs for the house, set automatic patching rather than manually for software and hardware updates, and turn off the Bluetooth when a virtual connection is not needed (I. T., 2023) When IoT are used in the office, Mr. Crume recommends effective policy and training for IoT use, enabling the discovery of new IoT devices connected to the network and enforcing positive security procedures.

In the case IoT connects the human body to a network, usually for health benefits, both the body and device can be remotely observed and controlled, such combination turn into an Internet of Bodies (IoB) (Marr, 2022). Bernard Marr, author of What Is The Internet Of Bodies? And How Is It Changing Our World? describes three types of IoB: 1) Body External, 2) Body Internal, 3) Body Embedded.

Body Internal IoB, such as a hearth pacemaker is an example of Body Internal IoB, which monitors the organ when implanted into the body. Lastly a Body Embedded IoB, is a device that becomes part of the human body when ingested or implemented, the Brain-Computer Interfaces (BCI) for example enable experts to receive brain signals from disabled patients with brain injury, monitor and control activities of the injured brains with the intent to restore the patients' independence (Marr, 2022).

Unfortunately, this great technology requires Wi-Fi capability and internet connection, and just as other sensitive information transmitted via the internet, PII and PHI related information transmitted from the patients' body to the device receiving the information is hard to protect from cyber-attacks (Marr, 2022). A bigger risk is present for patients that use Body Internal and Embedded IoBs, because the medical devices allow to control an individual's body remotely, any negligent or malicious act from the other end could be deadly to the patient.

The convergence of technology and healthcare raises both ethical and legal issues, (J., 2023). The benefits are too great to ignore, it feels like we are giving up our freedom for comforts. Despite the risks many are optimistic about IoT and IoB innovation, enforcing IT Security is the focus to benefit this technology to the fullest (E. O. T., 2020).

As far as recommendation, I think IBM Cyber Engineer Jeff Crume suggestions to secure all home IoT under a separate network is great idea, a national business Crume recommendation to secure IoT in the office, such as, policy, training of workforce, secure network and devices and ability to track new devices adding to the network. A different mindset is required when using IoTs and IoBs, the user must be aware of the risks, weigh the risks against the benefits, and refrain from connecting to the internet when not needed. Because all cyberattacks to IoT and IoB are malicious in intent, this technology as well as the information contained should be protected by the law, and all hackers prosecuted.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Smith And Keenans Law For Business

Authors: Denis Keenan

13th Edition

1405824042, 978-1405824040

More Books

Students also viewed these Law questions

Question

Briefly explain the qualities of an able supervisor

Answered: 1 week ago

Question

Define policy making?

Answered: 1 week ago

Question

Define co-ordination?

Answered: 1 week ago

Question

What are the role of supervisors ?

Answered: 1 week ago