0% found this document useful (0 votes)
19 views

Chapter 12 Case Study Analysis

Uploaded by

Chester Mochere
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
19 views

Chapter 12 Case Study Analysis

Uploaded by

Chester Mochere
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

1

Chapter 12 Case Study Analysis

Student’s Name

Institutional Affiliation

Course Name and Number

Instructor’s Name

Date
2

Chapter 12 Case Study Analysis

Introduction

The Internet of Things (IoT) is one of the latest technological advancements

revolutionizing human life, both domestically and commercially. The Internet of Things avails

numerous benefits to users through interconnected devices. The benefits of IoT are driving its

utilization at unprecedented rates; this is evident in the multiple AI devices found on Amazon’s

home page. These devices on the top page of the largest e-commerce platform in the world are an

indicator of the popularity of the technology. This paper evaluates the cybersecurity implications

of the Internet of Things and the potential of Artificial Intelligence to address the cybersecurity

issues.

Background to the Case

The case study illustrates the utilization of the IoT in the day-to-day operations of

business organizations bringing about Industrial IoT. There is a trend of integrating Information

Technology with Operations Technology because of improved productivity, efficiency, and

autonomous operations. Corporations are channelling billions of dollars to automation and

Artificial Intelligence, with projections showing that IIoT will grow to become a $500 billion

market by 2025 (Durbin, 2021). However, Operational Technologies are a breeding ground for

cybercrime for multiple reasons. These technologies often lack adequate security and software

patches leaving them vulnerable to attacks (Durbin, 2021). There is also a skill and resource gap

in addressing the vulnerabilities. In addition, operational technology has a high value for

attackers giving them the incentive to launch attacks and bargain for payouts (Durbin, 2021).

Artificial intelligence applications are proposed as the possible solution to make up for the
3

vulnerabilities associated with operational technology (Durbin, 2021). Companies need to

consider the security implications associated with IIoT carefully. Artificial intelligence provides

advanced tools that can help address security implications.

Discussion

IoT devices are highly beneficial in day-to-day life. IoT devices practical to day-to-day

living include smart watches, refrigerators, smart door locks and medical sensors. These devices

bring about convenience in carrying out personal tasks. Devices such as medical sensors improve

personal well-being, especially for individuals with diabetes. The interconnection of these

devices has benefits such as saving time and enhancing personal security.

Smart devices at home allow for communication of smart devices and give an individual

greater control over the environment. There are benefits to having smart devices at home in

terms of convenience and advanced security. First, cost and time-saving are beneficial (Stojkoska

& Trivodaliev, 2017). When smart refrigerators, smart watches, and smart heaters are used, it

can save time and money. Automation of home processes can also save time that could otherwise

be spent performing the tasks. Overall, it improves comfort and quality of life (Stojkoska &

Trivodaliev, 2017). Smart devices have cons, such as a potentially high risk of vulnerability to

attacks. If the systems are hacked, they can breach an individual’s privacy and pose a security

threat (Stojkoska & Trivodaliev, 2017). For instance, smart locks are an effective safety

mechanism, but since they are susceptible to attacks, it poses a significant security issue.

Therefore, there are both advantages and disadvantages to the use of smart devices.

Scanning Apps in grocery shopping can be beneficial to both the customer and store. It is

time-saving for the customer due to eliminating the time that could otherwise be spent at the
4

teller paying for commodities. These apps are also convenient because they help customers

calculate the amount spent while they continue shopping. The scanning apps can also help

reduce congestion at points of sale and gain benefits of enhanced customer shopping experience.

Scanning apps operate by accessing the shopper’s information and using it while they are

shopping. Due to its access to personal information, including money wallets that could be

online, there is the risk of attacks that could lead to the loss of money. However, the convenience

of shopping and the potential to overcome the potential risks make scanning apps an appropriate

tool in a retail shop.


5

References

Durbin, S. (2021). Council Post: Artificial Intelligence: The Future Of Cybersecurity?

https://www.forbes.com/sites/forbesbusinesscouncil/2021/09/23/artificial-intelligence-

the-future-of-cybersecurity/?sh=efdafef454c9

Stojkoska, B. L. R., & Trivodaliev, K. V. (2017). A review of Internet of Things for smart home:

Challenges and solutions. Journal of cleaner production, 140, 1454-1464.

You might also like