Order Now

Internet Of Things And Their Relationship With Public Safety

Category:

No matching category found.

0 / 5. 0

Words: 1316

Pages: 5

49

Internet of things and their relationship with public safety

Introduction

The Internet has become an integral part of our daily lives and has grown at the speed of light. Between 1995 and 2016, the number of users grew from 44 million to 3.4 billion (3.4 billion), and that number continues to increase globally. In this area, it has probably been heard of the term "Internet of Things", known as IoT for its acronym in English. But do you know exactly what is the Internet of Things?, How does your daily life affect and what its risks and where is it directed?

Above all, here we can ask us the main question. Why is it important?

Developing

The Internet has evolved, because it starts as a connection from our personal computers, to check emails and enter web pages, it has traveled to various devices. The Internet is currently present in each of our aspects of daily life. When we use the cell phone, we use the Internet, when we review the news we use the Internet, when we play video games we use the Internet, the doctor who attends a patient and reviews his analysis Use Internet, we can even receive the time of time from our refrigerator using the world network. That is currently known as the Internet of Things.

The Internet of Things can be defined, as a highly interconnected network of heterogeneous entities, such as labels, sensors, embedded devices, portable devices, etc., that interact and communicate with each other in real time.

Wait! Internet Of Things And Their Relationship With Public Safety paper is just an example!

IoT gradually enters daily life and revolutionizes the way in which people and organizations interact with the physical world, interaction with domestic devices, cars, industrial plants, etc. It will also allow many services such as health, education and resource management, to be improved for customer comfort.

This term is currently a booming expression that refers to common objects that with the advance of technology are being interconnected to the Internet. Nowadays it is common for most citizens to have a smartphone, a tablet or portable equipment. This makes permanent internet access regardless of where the user is.

In other words, IoT connects your devices to the Internet or other devices, so that they can perform new functions, such as controlling intelligent elements remotely and receiving alerts and state updates. It refers to the billions of physical devices worldwide that are now connected, collecting and sharing data.

The Internet of Things Power objects that were formerly connected by closed circuit, such as communicators, cameras, sensors, and others, and allows them to communicate globally by using the network of networks. If we had to give a definition of the Internet of things, it would probably be to say that it is a network that interconnects physical objects using the internet.

The devices that are currently connected to the Internet range from device connected to an intelligent house, such as thermostats, light switches or spotlights, locks, security cameras and other household appliances and intelligent devices, even in the future it is intended to be used as in autonomous vehiclesand a series of other technologies. If a device can be connected directly to the Internet, or if you can connect to any other device that connects to the Internet (but it is not a computer device that would be expected to have an Internet connection to perform its main functions), probablyIt fits the definition.

Logically, such advance always awakens suspicion, especially in what has to do with the security field. The Internet of Things also brings people and public security risks. The risks vary depending on the criticality of the device either by the function they perform or for the dependence of it. In any case, it is important to know the most common risks and areas that can be affected by the materialization of a threat. The materialization of the threats to which our devices are exposed can affect the accessibility of the device, the integrity of the information it contains and the identity of the user that possesses it, since it can cause an identity impersonation. And we are not there, since the availability may be one of the aspects that can generate the most problems, mainly if we talk, for example, of industrial environments where a service stop due to an attack through the Internet can cause great losses. Another factor to take into account and directly related to information is the confidentiality of the data, which must be guaranteed both the information stored in the device and the one transmitted in the communications that it performs, more if they are through the Internet.

GPS positioning. As we have mentioned earlier, wearables are devices that a user is wearing. Usually, these are connected to the Internet, so they can easily be geoposed at all times (some even include GPS modules dedicated to it). This makes the user location registered on some website and, depending on the privacy settings, can be available to anyone. This situation also occurs when using a smartphone if we do not know what applications they have access to location.

The theft of information as commented, in the devices that we connect to the Internet, we store more information. In many cases, and given the new cloud mentality, we can access that information from other devices through the Internet, from mobile applications or from web environments where to access we have a user and a password. In the event that a third could access, it would have information that could violate our privacy. The use of applications on internet connected devices can make certain information public, such as health and healthy life applications that can publish the GPS position, calories burned during the race, age, height, weight, weight,The kilometers traveled and all in real time!

What can be done to avoid this kind of problem? Use practically the same technology to propose actions to avoid information leakage or privacy violation. Here the law can do nothing but establish behaviors that are reproachable for society, but the technology itself can put more and more barriers to the enormous advance of technology. If the Internet of things implies a global interconnection, in real time, especially now with the speed management speeds, it is the same technology that must provide public safety with elements to limit it. Firewalls, encryptions, antivirus, to mention some, must follow the rhythm of advance, to be the limit of the advances that the Internet of things implies.

conclusion

For this reason, it is important for public safety to know the advances of technology and the challenges that its use and expansion implies, because despite the fact that the face they present is to improve daily life and make it easier, always criminals will seekthe weak point and as by teasing the existing laws and acting outside the law. Although, in the vast majority of cases, the technology and the Internet of things will come out of the knowledge of public security experts, that does not mean that, knowing their progress and surrounding themselves from experts in the area, strategies can be plannedFor the excessive brake on its use.

Information sources

  • Martínez, J. (2017). Internet security of things: analyzing information traffic in iOS applications. Retrieved at: https: // www.Redalyc.org/pdf/5122/512254534005.PDF
  • Torres, j. (2014). What is the Internet of things works and how? Retrieved at: https: // hypertextual.com/file/2014/10/internet-Cosas/
  • Peña, m. (2019). What is the internet of things and how your daily life affects. Retrieved at: https: // is.Digitaltrends.com/Trends/Que-Is-The-Internet-of-Las-Cosas/
  • Internet security of things, art state. Retrieved at: http: // www.CSIRTCV.GVA.ES/SITES/ALL/FILES/DOWNLOADS/%5BCSIRT-CV%5D%20 INFORM-INTERNET_DE_LAS_COSAS.PDF

Get quality help now

Dustin Abbott

5,0 (359 reviews)

Recent reviews about this Writer

To be honest, I hate writing. That’s why when my professor assigned me with coursework, I just took the easy way out and hired AnyCustomWriting to assist me. I’m absolutely satisfied with the result, no flaws.

View profile

Related Essays