The Internet of Things (IoT) aims to automate processes and services by networking entities and adding real-time analytics, resulting in active engagement and decision-making. The â€œthingsâ€ in IoT use sensors to extract data from their environment, and their built-in actuators implement the decisions taken by some controlling authority. A colossal number of networked entities/â€thingsâ€ provide a huge amount of data to be analyzed in real time, or near-real time, for decision-making. IoT relies on the existing Internet plus the IoT entitiesâ€™ wireless sensor networks (WSNs) for network infrastructure. IoT operation requires lightweight entities and protocols, meaning that cloud storage and big data analytics are critical components of the IoT landscape.
IT has rapidly transformed our world into a global village. With numerous facilitations and automations our lifestyle has revolutionized. Todayâ€™s settled life is incomplete without Internet, connectivity, mobile phones, social media etc. On the other hand, IT has provided assistances to the criminals and negative forces as well. Numerous articles and blogs surface on a regular basis concerning cyber security and the controls to safeguard against cyber hackers.
Cyber security has attained more attention in recent years as compared to earlier times of the IT boom. Enterprises do not hesitate to spend handsome amounts on cyber defense because they realize the repercussions of overlooking the cyber security aspects. But the question arises whether cyber-attacks are due to cyber security controls being installed by enterprises? This is not the case. Enterprises are still being attacked resulting in loss of data, reputation and money.