Surviving the IoT Cyber-attack Pandemic

Topic

Surviving the IoT Cyber-attack Pandemic

Instructions

Iteration 1
In iteration 1, you anticipate two or three brainstorming sessions with representatives from each of the three divisions with each session last a maximum of two hours. The session discussions will include identifying current process flow, a gap analysis, gathering process requirements, and communication flow. In addition, the iteration will include compiling, analyzing, and reporting the results of each brainstorming session.
Iteration 2
You expect there will be several one-hour follow up session with each of the division representatives to discuss the outcome of the brainstorming session, clarify information, and gather more detail about their division’s requirements. Again keep this to one or two paragraphs, I encourage you to focus on the big picture.
Iteration 3
This iteration will be a two-hour follow-up meeting with the three division representatives to discuss identified common requirements, possible integration of requirements, and discussion of how unique requirements will be managed at the division level. The researcher will manage common and integrated requirements, and the appropriate division must manage unique requirements. At the conclusion of this meeting, the division representatives will be tasked with formulating a solution for all unique requirements.
Iteration 4
You need to fully analyze the feedback concerning the requirements from each of the divisions. Then, document a final process to collect ‘needs’ from each of the divisions.

Iteration 5
A final two-hour meeting is needed to present the new process. Copies of the new process will be provided to each division.

Answer preview

The article by Ronald E. Quirk and Terry Dunlap addresses the security concerns resulting from “The Internet of Things.” The text refers to a Thomas Ricker’s article describing the massive distributed denial of service (DDoS) cyber-attack.  The article highlights recent malware detections and intrusions on devices in the United States.

Unprotected IoT devices are considered as highly susceptible to attacks from malicious software, comprising the devices and home routers.  Attacks on unprotected Internet of Things devices are described as the main factors that affect popular websites. For example, Mirai is a malware that attack devices with factory-default settings, cracking passwords and usernames to gain access devices.

Word count: 343