Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Please responde to the below post with some advice about how to strengthen their legal and/or ethical ideas Try to brainstorm items you use daily

Please responde to the below post with some advice about how to strengthen their legal and/or ethical ideas

Try to brainstorm items you use daily and could not live without. Do you use the following things throughout your daily routine: an Apple Watch, smart TV, Amazon Alexa, Google Nest, Nest Thermostat, Ring doorbell, remote start for your car, Apple CarPlay, or Keurig Smart coffee maker? If so, you interact with the Internet of Things (IoT), which is a network of physical devices embedded with technology to enable devices to share data and connect with other systems on the Internet (Oracle, n.d.). It's truly fascinating how much our current society relies on IoT. There are significant benefits, such as starting your car from inside the house, waking up to a hot cup of coffee, and changing your thermostat from hundreds of miles away, but unfortunately, IoT has created cybersecurity risks and privacy issues that cannot be ignored.

Cybersecurity Risks in Using "Smart" Appliances

Smart appliances can add significant value to our everyday lives; however, there are considerable cybersecurity risks that consumers submit themselves to. The bottom line is that IoT increases an individual or organization's vulnerability to a cyber-attack due to weak authentication, shared network access, inconsistent security standards, and lack of device management (Henke, 2023). Many IoT devices have bare minimum authentication protocols such as no passwords, default passwords, or weak password requirements, which makes them extremely vulnerable. Additionally, all the IoT devices I listed above connect to a home or organizational Wi-Fi network. As a result, each device that you connect to your network increases your attack surface. Thus, threat actors can target smart appliances to gain a foothold within your network ). In addition, there is no industry-wide or universal standard for IoT devices; therefore, each developer creates their own protocols (Henke, 2023). Finally, many organizations fail to properly manage all their IoT devices, which reduces the likelihood of them being able to identify suspicious activity .

Privacy Issues with IoT Devices

In addition to cybersecurity risks, IoT raises significant privacy issues. For example, in 2023, Amazon was charged by the Federal Trade Commission and the Department of Justice for violating the Children's Online Privacy Protection Act (COPPA) by recording and storing children's data, geolocation, and voices and declining parents' deletion request). As a result, Amazon had to pay a $25 million fine and delete children's data (Federal Trade Commission, 2023). This Amazon case proves IoT privacy issues are occurring in our society. UC Berkeley Center published an eye-opening report about privacy concerns related to the development of IoT. The authors discuss several of the most pressing issues, including losing the ability to control data collected about you and your family, which is exactly what occurred in the Amazon Alexa case . In addition, large companies share data with many third parties, making it even harder to track where your data is being used. Finally, the authors outline how spaces that have always been considered private, such as your home, are slowly being filled with IoT devices that have the capability of monitoring

Theoretical Procedures That Could Helpfully Address These Matters

Industry-wide or universal standards for IoT devices would significantly help lessen cybersecurity risk and privacy issues associated with these devices by providing best practices to developers and consumers of these technologies. However, the development of standards will take a significant amount of time; therefore, in the meantime, individuals and organizations should ensure that they replace default passwords with new ones that follow password best practices. In addition, everyone should segment their network from IoT devices, which can be accomplished by implementing security gateways or firewalls between these devices and the network (.

Actions To Ensure IoT Products Are Not Used for Illegal Purposes

Regulators such as the Federal Trade Commission need to continue standing up for consumers' privacy rights and fining organizations for violating laws, similar to the Amazon example above, to ensure IoT devices are not being used for illegal purposes. In addition, the United States needs to adopt an overarching and strict regulation, such as Europe's General Data Protection Regulation (GDPR), to give individuals full rights to know how their data is being collected, analyzed, and used and the ability to have it erased

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Equity Asset Valuation

Authors: Jerald E. Pinto, Elaine Henry, Thomas R. Robinson, John D. Stowe, Abby Cohen

2nd Edition

470571439, 470571438, 9781118364123 , 978-0470571439

Students also viewed these Law questions