The Dangers of Internet of Things

Topics:
Words:
1493
Pages:
3
This essay sample was donated by a student to help the academic community. Papers provided by EduBirdie writers usually outdo students' samples.

Cite this essay cite-image

Each year, technology all over the world gets more advanced and tortuous, but the things that are controlled by the Internet are the most cautious to be around. According to museum manager and local historian, Bethany Groff Dorau, she elaborates with evidence from Kevin Ashton: “The term ‘Internet of Things’ itself is believed to have been coined in 1999, at a presentation to industrial giant Procter & Gamble by Kevin Ashton, then a marketer with the company. Ashton was interested in using radio-frequency identification (RFID) to improve supply chains and went on to pioneer the technology at the Auto-ID Center at the Massachusetts Institute of Technology (MIT). He focused on the potential to increase efficiency in virtually all areas of life by allowing computers to gather information about physical things rather than just ideas input by humans”. While there is some truth that the Internet of things help people around with teaching them about their health, make chores and life easier, and help clear global problems, it is important to keep in mind that the information that is spread into the Internet of things like refrigerators, phones, and computers can be collected in exchanges of information, robbery, and personal threats. As technology evolves for centuries, the things that are controlled by the Internet can lead to endangering many people’s mental and physical health without knowing the negative effects of technology on things.

The parlous of the Internet can lead to privacy outburst. To start, personal opinions from other researchers from the Science News for Students website, with the multi-written and authority of being a reliable source author Stephen Ornes cites: “Earlence Fernandes, a computer scientist at the University of Michigan, in Ann Arbor works on network security, knows that every new device brings new hacking risks. By focusing on those risks, researchers can work on installing safeguards to stop an attack from stealing our data, our privacy, and our safety. Maria Ebling is a computer scientist at IBM’s Thomas J. Watson Research Center says that parents and children can make good decisions if they understand their gadgets. “They should be aware of what sensors are there to make them work”, she warns. In late 2015, the doll Hello Barbie comes with a hidden microphone and speaker. And with that data, they can start to plan bigger thefts. For instance, “They know what time you are home, or when you’re on vacation”, notes computer scientist Sye Loong Keoh, who studies computer security at the University of Glasgow campus in Singapore”. The fact that children have to be dragged into this hacking problem is so absurd. Many would say that they can educate their children, but their children won't even know that their doll, computer, or any other device is being monitored or is the monitor until the adult has taken care of the situation. Concerning privacy, Stephen Ornes also states, “Hackers and marketers aren't the only ones interested in learning about you. Government spy agencies too. In January 2014, a former NSA worker released secret documents from the agency. Those documents showed that NSA wanted to use Angry Birds data to spy on people. So, did a spy agency in Great Britain. Like other apps, personal information over the Internet - where it can be stolen”. Things with the Internet can also become information for the government and I don’t see what the government is going to do with information from the Angry Birds app. Not only is this a caution to adults, but people of all ages need to be careful of what they do and download since many things can be monitored and exchanged for personal benefits or dangerous reasons like robbery.

Save your time!
We can take care of your essay
  • Proper editing and formatting
  • Free revision, title page, and bibliography
  • Flexible prices and money-back guarantee
Place an order
document

The beginning of IoT has never been completely secured in any system. Referring to the website NewGenApps, the publisher Anurag with no last name provided states, “Researchers at MIT and Michigan have found too many loopholes in some big brand smart devices which could give hackers more entry points to breach the security public confidence. In 2015, Control State of the Smart Home found out that people were very much concerned about their information getting stolen from smart homes”. With evidence from Mike Hockett, an editor of Evaluation Engineering or EE, he uses statistics, “The number of Internet-connected ‘things’ already exceeded the global human population back in 2008. By 2025, the global worth of IoT technology is projected at $6.2 trillion, with the maximum value from healthcare ($2.5 trillion) and manufacturing ($2.3 trillion). Of all the businesses that chose to implement IoT, 94% have already seen a return on their IoT investments”. Though it is a good point that the Internet of things is rising and will be increasing in the purchase, it fails to take into account that these smart devices are not completely closed off and can lead to exposing our information than hackers finding any weaknesses in the system companies built and use it for their benefit.

There have been many incidents where people have been hacked and never know how they were hacked in the first place. The incidents were never safe for children or adults. Based on the GAO Reports from May 2017, they report to the Congress with a list of reasons for not using IoT, “In May 2016, resulting in a fatality for the driver. Neither the autopilot nor the driver noticed the white side of the tractor-trailer against a brightly lit sky, so the brake was not applied. For example, in September 2016, a well-known security blog was targeted by a massive denial-of-service attack by the Mirai botnet because many IoT devices are unsecured or weakly secured, this list allowed the botnet to access hundreds of thousands of devices. The attack involved over 380,000 IoT devices, including network-enabled cameras and digital video recorders in homes and offices. The same type of attack occurred in October 2016 that targeted a company whose servers monitor and reroute Internet traffic, leaving major websites unavailable to people across the United States”. Not only were people in danger outside but even in their own living space where we should be safe and not worried about whether we are endangered or not. According to Laura Tyrell from USA Today Magazine in January 2020, she reveals multiple objects that can harm while in confiding buildings and homes: “A few years ago, a group of hackers managed to access a casino’s network via an Internet-connected thermometer in an aquarium and extract its high-roller database with all sensitive details. In 2018, a family experienced a real nightmare, as a hacker got into the wireless camera system used to keep an eye on the baby and threatened to kidnap him. This case is not an exception. There are several reported incidents of strangers' voices being heard over baby monitors. In 2016, hackers left the residents of two apartment buildings in Lappeenranta, Finland, in freezing cold for nearly a week by launching a denial-of-service attack on their environmental control systems via thermostats. In 2017, the Food and Drug Administration confirmed that St. Jude Medical’s implantable cardiac devices easily could be hacked with controlling shocks, administer incorrect pacing, and deplete the battery—and this is not the only time the FDA has issued such warnings. In 2017, Germany banned an interactive doll ‘My Friend Cayla’ because it contained a concealed surveillance device and has an insecure Bluetooth device installed in the toy to listen and talk while a child is playing with it. In 2015, a team of researchers was able to take total control of a Jeep SUV. By exploiting a firmware update vulnerability, they hijacked the vehicle and made it speed up, slow down, and veer off the road—almost a scene from ‘Fast and Furious’”.

We shouldn’t be depending on technology in many cases, but it makes our life easier and less complicated with phones as distractions and being able to communicate without even being in the same space. As the expert opinion from pewresearch.org, JP Rangaswami, Chief Scientist for Salesforce.com states, “This will affect the food you buy and cook and eat; the fuel to power yourself, your devices, and your vehicles; the time you take to do things; and, as you live longer, the burden of care will reduce better monitoring of response to, your physical and emotional state, in terms of healthcare. Our notions of privacy and sharing will continue to evolve engage with information using all of their senses: touch and feel, sight, sound, smell, and taste—using them in combination, more often than not. We will see today’s connected devices become smaller and slowly merge into the part of the body from where the particular sense related to that device operates”. I do agree that the Internet of things will make our life and future generations have a better life with more opportunities, but we can’t let it control our lives. We are not robots. There needs to be a stop to the hacking or an increase of privacy systems for the safety of ourselves and others.

Make sure you submit a unique essay

Our writers will provide you with an essay sample written from scratch: any topic, any deadline, any instructions.

Cite this paper

The Dangers of Internet of Things. (2022, August 25). Edubirdie. Retrieved December 5, 2024, from https://edubirdie.com/examples/the-dangers-of-internet-of-things/
“The Dangers of Internet of Things.” Edubirdie, 25 Aug. 2022, edubirdie.com/examples/the-dangers-of-internet-of-things/
The Dangers of Internet of Things. [online]. Available at: <https://edubirdie.com/examples/the-dangers-of-internet-of-things/> [Accessed 5 Dec. 2024].
The Dangers of Internet of Things [Internet]. Edubirdie. 2022 Aug 25 [cited 2024 Dec 5]. Available from: https://edubirdie.com/examples/the-dangers-of-internet-of-things/
copy

Join our 150k of happy users

  • Get original paper written according to your instructions
  • Save time for what matters most
Place an order

Fair Use Policy

EduBirdie considers academic integrity to be the essential part of the learning process and does not support any violation of the academic standards. Should you have any questions regarding our Fair Use Policy or become aware of any violations, please do not hesitate to contact us via support@edubirdie.com.

Check it out!
close
search Stuck on your essay?

We are here 24/7 to write your paper in as fast as 3 hours.