Argumentative Essay On Internet Of Things

Decent Essays
Do you ever feel like somebody is watching you? Seeing your every move? B. Although, the Internet of things is making our lives easier each day, our instant access to information comes at a cost. C. During this presentation I will discuss three key points on the issue on the Internet of Things. 1. Sensitive data constantly being retrieved unnoticed over the World Wide Web at a high rate. 2. Distributed Denial of Service attacks on smart devices and how it affects us as users of an internet connected device. 3. Privacy risk that an intruder could be spying on you and you not noticing it till it’s too late. D. We all own and use some type of internet connect device like smart phones, smart watches, smart cars, smart TVs, and even …show more content…
Privacy risk that an intruder could be spying on you and you not noticing it till it’s too late. 1. The IOT device that you carry around or the ones that are in your home will be eavesdropping you through video on the cameras and audio recordings you just don’t know it. 2. A hacker will get into a particular IOT device in your smart home and then have control of all of the devices, he or she can be watching you or your house while you are out of your home without your permission or if you are inside your house the hacker might seeing your every move just waiting for the right moment to attack. The attacker will know who you are talking to over the phone and where you are located by the device’s GPS system that is already intact with the IOT device. Transition Statement: For this reason, the smart devices are highly unsecured. III. THE CONCLUSION A. I have talked about insecurities of the Internet of things and in what ways they can cause damage. B. The Internet of Things can make our lives better by day, but by night the attackers come out to seek your valuable information, cause Distributed Denial of Service attacks, and even take away your privacy. C. Final Focus: Above all, do you still feel like somebody is watching

Related Documents

  • Improved Essays

    Information privacy is the major issue in the current generation. People are more concerned about their convenience along with security. For example if the car breaks downs, one can push a button and the On-star operator will provide help by tracking the location of the car. This situation explains how conveniently one get the service immediately. On the other hand, we are not sure who is tracking our car location and is there any harm caused by that person.…

    • 347 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Attackers exploiting default configurations to gain access to the network and to information stored on devices in the network are major threat to home gateway devices. In order to mitigate this threat there are many common default configurations a user should change. When setting up a home network, a user should make sure to change the default passwords. They should set up a strong account password and wifi password using best practices. The user should use a strong security protocol such as WPA2 instead of the default WEP which is not secure.…

    • 693 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    c. Data computing The IoT devices are going to handle a lot of information for better consumer experience. This information needs to be analyzed and processed in real time. If the data is not processed in an appropriate time frame, then that would lead to consumer dissatisfaction. Moreover, the issue lies in the amount of data that will be generated from the IoT devices.…

    • 1436 Words
    • 6 Pages
    Great Essays
  • Superior Essays

    Privacy issues have been a massive problem since before time was dated and is only getting worse. The book 1984 was published before the actual year stated but never actually happened. It is scary how the book is becoming more real as time passes. In today’s world, it is much like 1984 by Orwell, because digital assistants such as Facebook, Siri, Alexa, and hidden microphones are always listening and smart devices with cameras are always watching.…

    • 972 Words
    • 4 Pages
    Superior Essays
  • Improved Essays

    The FCC, with Ajit Pai as the current chairman, is trying to repeal the Title II net neutrality regulations. “At the May 18, 2017 Open Commission Meeting, the Commission adopted a Notice of Proposed Rulemaking that proposes to restore the Internet to a light-touch regulatory framework by classifying broadband Internet access service as an information service and by seeking comment on the existing rules governing Internet service providers' practices” (FCC Initiatives). Broadband providers are currently classified as common carriers under Title II regulations. A Title I classification classified providers as information services, which allowed information service providers to get away with doing some scummy things. For example, even while classified…

    • 692 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    You are being watched… What if every word you spoke was recorded? Would you still say some of the things you say? Domestic surveillance is the topic, it is represented as a good thing because it helps keep the government and people in the world accountable for all of their actions through technology. Domestic surveillance is helpful to prevent terrorist attacks and other bad things from happening because it keeps people accountable for their actions and words.…

    • 773 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    National Security Agency

    • 1122 Words
    • 5 Pages

    Federal agencies have led law enforcement efforts against computer crime since these agencies hold the technical expertise and political influence to gather significant financial and operational resources at the national level. Thus, these agencies have progressively reorganized in an attempt to channel resources directly at preventing digital crimes and capturing computer criminals, including the creation of special sections within these organizations, employing of new personnel who have specialized technical skill in this area, and the creation of new collaborative sections that combine the resources of multiple agencies. Department of Justice (DOJ) United States Department of Justice was established in 1870.…

    • 1122 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    With the advancement of technology comes a startling decrease in privacy. Nothing is considered ‘personal’ by the internet, or private, or kept a secret. Anything put on the internet is forever immortalized. Technology like cellphones, laptops, and drones have invaded the sense of personal privacy and eliminated the prospects of privacy returning to those who possess technology.…

    • 382 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Governments spying on Governments Spying on governments from different countries could be useful, but wrong at certain times. You never know when the next war could start, or where the criminal the government wants is. I am going to debate on if spying can be appropriate, can it be erring, or unnecessary and dangerous. Is spying appropriate on some measures?…

    • 481 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    We might detest how technology can track our daily lives in ways that might be deemed as unethical to many of us. Yet, when it comes to the greater good technology does definitely aid. Looking back into history, the development of a variety of technological devices have improved our security. CCTV footage helps immensely with surveillance; it helps identify individuals, deter robbery and produce a safe environment for society. In addition, digital footprints while collected without our consent inevitably helps locate and single out individuals that have malicious intentions.…

    • 1456 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    As humans continue to crave convenience, large technological companies are starting to add features to make products easier to use. However, the consumers do not realize that in order for them to receive such large amounts of convenience, they are sacrificing their privacy. Some of Samsung’s new Smart Televisions ship off “...voice data to an unnamed third party—presumably for the purpose of translating the speech to text”(Newman). This perfectly illustrates how today’s latest technology is invading privacy, one step at a time. People who use the voice command feature on their television can accidentally say something that they should no tell others.…

    • 1601 Words
    • 7 Pages
    Improved Essays
  • Improved Essays

    As computers became essential to business, industry, trades, and professions, educators and parents became increasingly concerned that young people acquire at minimum the basic understanding of computers and master the related skills. 2. Explain computer algorithms and its significance An algorithm is a set of instructions designed to perform a specific task. In computer science, an algorithm is a set of steps for a computer application to accomplish a task.…

    • 790 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    In his article entitled “Internet Access Is Not a Human Right” published on the website of The New York Times on 4 January 2012, Vincent G. Cerf, a vice president and chief Internet evangelist for Google, presents his perspective on a controversial issue regarding access to the Internet. He argues that access to the Internet should not be accepted as a human right, “it’s just a tool to achieve those rights.” According to Internet World Stats (2014), over a third of the world’s population are accessing the Internet as a part of their everyday life. This proves that the Internet plays numerous significant roles in society. It makes our lives easier and more convenient than in the past, by providing information, education, communication, business, and freedom of expression.…

    • 1148 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Today’s internet has become an integral part of our daily lives. It changed the world in so many positive ways, but it has also a negative side to it. The negative issues that we are facing today with internet are our online privacy and data breaches. Recently, many people were divided in terms of their strong views about the importance of privacy and the exchange “between security needs and personal privacy” (Rainie & Maniam, 2016) as millions of Americans were also affected by online threats and privacy breaches and at the same time concerned with our security. The focus has been on government monitoring, although there are some other significant issues and concerns about how industries use our data.…

    • 952 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    5:00 am breeze, blue uniforms, red tool boxes, and noise above 80 decibels, in year 2013, factory floors at the American manufacturing facilities accounted for 12.5% of the total gross domestic product. US manufacturing has come a long way, from cotton and Tabaco production in 1800 to modern day airplanes of the 20th century. Last two decades have seen unprecedented growth in automation in manufacturing facilities, however, internet of things (IoT) will be a new revolution to promote smart factory culture, moreover, as per the “Converging Technologies for Smart Environments and Integrated Systems, “chapter 3, IoT applications, smart or “future factories” will be a big a achiever of IoT, furthermore, per year in 2025, IoT application in the…

    • 982 Words
    • 4 Pages
    Decent Essays