EMERGING TRENDS IN COMPUTING
INTERNET OF THINGS IOT
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
Which of these security approaches is feasible for most IOT devices?
|
Use of antivirus software
|
|
Use of internal firewall
|
|
Regular installation of product firmware updates
|
|
Complete separation of the device from the internet
|
Explanation:
Detailed explanation-1: -Unlike traditional computer-based systems, IoT devices are “embedded” within other devices in order to provide enhanced functionality without exposing the user to the complexities of a computer. The users interact with the device in a natural way, similar to their interactions with any other objects in the world.
Detailed explanation-2: -What is the best approach to prevent a compromised IoT device from maliciously accessing data and devices on a local network? Install a software firewall on every network device. Place all IoT devices that have access to the Internet on an isolated network. Disconnect all IoT devices from the Internet.
There is 1 question to complete.