Abstract
In this research we addressed an issue of big importance with regard to information and computer science security. Within this area, we know that security is framed within the CIA triangle, which refers to confidentiality, integrity and availability of information or objects connected to the Internet, a subject that should be treated with great awareness. There were some questions that we inevitably must ask in order to understand at a deeper level the different aspects of information security, such as: What is an object? How safe is our private information? What privacy settings do we have? We live in an interconnected world where most of devices at home, businesses, industries, organizations, and cities are connected to the Internet. Within that environment, these objects are fulfilling some functionality that facilitates the lives of each individual, although making them somehow dependent on this technology with a high degree of risk to which they are exposed. This study aimed to explain and demonstrate that most of electronic devices or intelligent objects that are developed, locally or overseas, do not have a proper design with regard to making information security a first priority, then, proposing a guiding scheme that allows an adequate development cycle of intelligent objects. The study concluded that we are not 100% safe, as well as cyber-attacks will continue to evolve, so the conception of information security will have to evolve as well.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
More From: INNOVATION & DEVELOPMENT IN ENGINEERING AND APPLIED SCIENCES
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.