Challenges for an always-connected but highly personalized device
One of the challenges that may be encountered in a device that is always connected and highly personalized is that of eavesdropping. In this case, the privacy of the device is compromised. Spying is considered to be one of the biggest challenges across devices that are connected. This is because communication always goes on and on. In the process of communication, sensitive data may be used against the owner. There are different ways in which the hacker may use to accomplish the spying mission. One of these ways is the use of cameras. In this case, the information collected will be recorded and be used at a later date, if not immediately. In the process of recording, the hacker may come across sensitive information that may compromise the integrity and privacy of the firm.
The other challenge that is common in always connected but highly personalized devices is the vulnerability to malware attacks. It is noted that the devices do not have regular software security updates that a computer may have. For this reason, they are quickly turned to infected zombies and are used as weapons to generate large volumes of traffic. Malware is a serious security threat in the current age of increased technological innovations and inventions (Sen, & IntechOpen (Firm), 2018). Apart from that, the other challenge is in the form of rogue devices or rather counterfeit malicious devices which are being installed without following any proper authorization. In this regard, a rogue device tends to replace the original one with the aim of alteration of sensitive information. To accomplish this, the devices break the network perimeter.
Besides that, the other possible challenge that is evident in a device that is always connected and highly personalized is the use of weak and default credentials. Most of the device providers are giving the users some sort of default credentials such as the admin username. For the hackers to attack the device, all that they require is the username and the password. With this, they can easily invade into the system. When an attacker gets to know of the said credentials, they can use brute force in attacking the device.
Last but not least, the other notable challenge with a device that is always connected and is highly personalized is the data integrity risk (Westerman, Bonnet, & McAfee, 2014). The hacker can gain control of a device once he manages to invade into it. The invasion can be achieved through the use of hacked credentials. When a hacker gains access to the system, he can alter the organizational data in such a manner that may tarnish the integrity of the organization. When data is manipulated without the consent of the holding organization, the effect of this is that it may make the entity lose confidence before the stakeholders and other parties. Therefore, there is the need to ensure that the highly personalized devices that are always connected are secured.
References
Sen, J., & IntechOpen (Firm), (2018). Internet of Things: Technology, Applications
and Standardization.
Westerman, G., Bonnet, D., & McAfee, A. (2014). Leading digital: Turning technology
into business transformation.