COMPUTER FUNDAMENTALS

EMERGING TRENDS IN COMPUTING

INTERNET OF THINGS IOT

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Which of these security approaches is feasible for most IOT devices?
A
Use of antivirus software
B
Use of internal firewall
C
Regular installation of product firmware updates
D
Complete separation of the device from the internet
Explanation: 

Detailed explanation-1: -Unlike traditional computer-based systems, IoT devices are “embedded” within other devices in order to provide enhanced functionality without exposing the user to the complexities of a computer. The users interact with the device in a natural way, similar to their interactions with any other objects in the world.

Detailed explanation-2: -What is the best approach to prevent a compromised IoT device from maliciously accessing data and devices on a local network? Install a software firewall on every network device. Place all IoT devices that have access to the Internet on an isolated network. Disconnect all IoT devices from the Internet.

There is 1 question to complete.