Discussion

Read this article and view the videos.

https://www.fastcompany.com/40448192/how-a-burning…

Relating the discussion topic to course material. Proper use of legal terms, proper citations, spelling and grammar count. At least 5 coherent sentences.

Attachment is course material.

 

Discussion

Need help with my Computer Science question – I’m studying for my class.

Discussion 1

Discuss annotated bibliography of three articles related to your topic.

My Dissertation Topic: Role Of Data Science In Making Data-Driven Decisions In App Development Companies

Note : Your answer must be 600 words and write at least three annotated bibliography of three articles. and also respond to the below student discussion with at least 100 words.

Student Discussion1

Healthcare IoT Security Threats

Butt, S. A., Diaz-Martinez, J. L., Jamal, T., Ali, A., De-La-Hoz-Franco, E., & Shoaib, M. (2019, July). IoT Smart Health Security Threats. In 2019 19th International Conference on Computational Science and Its Applications (ICCSA) (pp. 26-31). IEEE.

IoT technology is an active field of research since it is an emerging technology that promises to enhance mobile computing and wireless communication between smart devices. In the healthcare industry, Butt et al. (2019) suggest that IoT allows for continuous patient monitoring to ensure timely response to patients’ medical emergency needs. These systems face considerable threats and are more vulnerable to intruders due to wireless connectivity and heterogeneity enabled by IoT. The top attacks faced by IoT systems in the healthcare industry include denial of service attacks, time-based snooping, select and forwarding attack, replay attacks, sensor attacks, and router attacks (Butt et al., 2019). These systems can be attacked through internal and external threats; hence they are at a higher risk against violation. However, strategies for continuous route monitoring, early intrusion detection, and intrusion prevention can enhance the resilience of health IoT systems against security breaches and data security violations.

Eken, C., & Eken, H. (2018, December). Security Threats and Recommendation in IoT Healthcare. In Proceedings of The 9th EUROSIM Congress on Modelling and Simulation, EUROSIM 2016, The 57th SIMS Conference on Simulation and Modelling SIMS 2016 (No. 142, pp. 369-374). Linköping University Electronic Press.

The Internet of Things (IoT) technology has become popular in recent years, enabling the interconnection of devices in the healthcare industry. However, the security and privacy challenges in this technology cannot be ignored since they threaten a worldwide implementation of this technology. The development of healthcare technology and the adoption of Healthcare IoT (HIoT) have presented new opportunities and facilities to improve the healthcare sector and the delivery of services (Eken & Eken, 2018). These systems are used for monitoring patients remotely, hence reducing unnecessary appointments for patients to see the physician. Eken and Eken (2018) argue that energy optimization, privacy, denial of service (DoS) attacks, data manipulation, and trust between HIoT devices are the most significant threats against IoT technology in the healthcare industry. These threats can be controlled or eliminated through techniques such as implementing access controls, network security, firewalls, and establishment of organizational policies, standards, and guidelines for handling data through IoT systems.