for its customers of New York and London, both representing the local pop culture to build a
connection with their target audience.
Other than geographical aspect, businesses can tailor their IoT user experiencing by
ensuring those who use Google Chrome to browse and get a dierent type of user experience
while those users who use Mozilla Firefox receive a separate user experience. There is no death
of possibilities in such regard.
Empowering Customers
Identity and access management can assist you in addressing one of the biggest customer issues:
privacy. With the introduction of GDPR, businesses have begun to take data privacy more seri-
ously. While some wrongly view GDPR as merely a set of regulations, you can use it to improve
your business by fostering meaningful relationships with your clients. So, how to go around it?
Consumers have become more conscious about their rights of data privacy and have started
pressing businesses to allow them more visibility about what is going on with their personal
and sensitive information.
With identity and access management, businesses can find and assess how much of the
consumer data has been collected by their IoT devices and can present them to the consumers
in order to establish your credibility. As a result, your brand image improves and you can gain
more clients in a shorter time.
What is the importance of identity management and why it is used?
Flash Question
BEST SECURITY PRACTICES
Nowadays, one of the biggest discussions in cybersecurity is associated with the cybersecurity of
IoT infrastructure, particularly how to prevent a botnet infection. When the Mirai attack in 2016
occurred and became the biggest DDoS attack of all time, it fractured the security infrastructure
of Dyn, a large domain-name server. As a consequence, several online services and networks
were breached. The attack helped the industry realize that they needed to take IoT security more
seriously. Here are some security measures that can enhance the cybersecurity of IoT devices.
Avoid Botnets
It was ultimately the vulnerability of the IoT devices which gave rise to the infamous Mirai bot-
net, making hackers gain control of millions of IP addresses. However, just a month before Mirai,
another botnet attack was launched at Brian Krebs’s (a renowned security expert) website. The
size of that attack was more than 620 GBPS, a record high. During the same time period, attacks
were launched against OVH and touched 1.1 Tbps; it is said that around 145,000 smart cameras
were infected.
These were not the first examples of major IoT attacks. In 2013, cybercriminals compro-
mised the smart HVAC system of Target. Similar attacks were targeted against smart baby mon-
itors, smart televisions, and other IoT appliances and devices.
318 Internet of Things
Internet_of_Things_CH12_pp309-326.indd 318 9/3/2019 10:16:43 AM
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.144.205.223