As the author has outlined in his article” “the internet of thing has posed a positive outcome in its application context. In this case, there has been massive development in companies, organizations, schools, and other vital areas where the Internet of Things is applied. Nevertheless, there is still a threat that comes along. First, the Internet of Things is subject to cyber-attacks. In most cases, ordinary users have been hacked and their data deleted by people who can log in to the system illegally. The author outlines the significant factors that cause cyber attacks in the modern world (Checco, 2022). The primary factor that causes attacks is the final issue of banks and corporate organizations being sabotaged with the aim of getting monetary funds through fraudulent means. The critical tactical approach has led to losses and massive damage to the system, where people’s data has been exposed to unwanted hands.
On some occasions, data is accessed and damaged. If the company does not have a backup facility, they end up losing the entire system because they cannot retrieve the system in some cases. On the same note, there are cases of hacktivism that are motivated and influenced by political reasons. The United States is one of the nations that have surfed this attack because of the political rival countries. Hacktivism involves politically motivated cyber-attacks conducted by individuals, and they basically carry a political-based agenda. They commonly lay their attack on websites, disrupting services or stealing and exposing sensitive information to advance a particular cause. In some organizations, cases of competitive advantage arise when companies may opt to hack others to delay their services and ensure that they do not provide sustainable services to the company. Besides that, it causes a denial of services, and this causes an erosion of service structure. Spying is also among the reasons why the company may sabotage its competitor’s system. It helps them understand the dynamics that take place in the world of work (Martin, 2022). It also helps them lay down measures that can be used to set positive influence and find them in the world of work. Ideological and religious motivations in countries have religious wars; massive attack is a significant threat that has acted their sustainability. The lack of sustainable development measures and processes is a significant threat. Unfortunately, some corporate organizations that have suffered massive attacks have not adopted a sustainable infrastructure that can secure their data in the right way. The lack of cybersecurity measures creates an accessible runway for attackers to log in to the system. It is an issue that should be sorted out by management. Some of the measures that should be adopted include the use of an intrusion detection system. It allows the network admin to check any attack that can be launched in the system without the art of good faith. The vulnerabilities in software and systems vulnerabilities should worked to ensure that they are well secured to prevent any form of attack. On the same note, advanced software and systems security should be implemented to prevent illegal access. Other models that the authors have outlined include vulnerabilities in software and systems, Inadequate Access Controls, and advanced external policies that act as the legal and control guidelines that should be followed.
References
Checco, J. C. (2022, September 26). Cyber-Physical Coordinated Attacks: The Emerging Complexity of Crisis Management. https://www.jstor.org/stable/48703292. Retrieved December 10, 2023, from https://en.wikipedia.org/wiki/Water
Martin, B. M. (2022, September 26). Tactics and Technicalities Undermining Strategy: Cyber Security is Distracting National Security Communities. https://www.jstor.org/stable/48703291?seq=1. Retrieved December 10, 2023,