IoTName Institutional Affiliation IoTDespite the significant development of technology, the rate at which malware authors are creating countermeasures to disrupt information systems is compelling. With the proliferate of IoT devices throughout the world, securing data has emerged to be a significant challenge. IoT devices collect tons of data, which if not well handled can leak to third parties. Given the fact that data processing and retrieval remain critical components of all IT environments, the development of mechanisms to ensure the protection of data is inevitable. The security issues are known to undermine the functionality of IoT devices and hence their capacity to resolve issues that...
Words: 275
Pages: 1