Continue with your mobile number
The attack involves unauthorized access to IoT devices, making authentication the key concern. Strong authentication measures, such as multi-factor authentication (MFA) or device-specific credentials, can prevent attackers from gaining control. Proper authentication ensures: 1. Only authorized users or systems can access IoT devices. 2. Secure communication between devices in the IoT ecosystem. 3. Reduced risk of breaches even if other vulnerabilities exist. The lack of robust authentication exposes devices to unauthorized control, which was likely exploited in this scenario. Why Other Options Are Incorrect: • A) Confidentiality: Protects data but doesn't prevent unauthorized access to devices. • B) Availability: Ensures system uptime but doesn’t address access control. • C) Integrity: Focuses on preventing data tampering, not unauthorized access. • E) Non-repudiation: Prevents denial of actions but doesn’t secure initial access.
The chemical bahaviour of an atom depends upon
The most reactive among the halogens is
Which mineral is the ore Of aluminium?
Which gas is used for converting vegetable oils into saturated fats?
When Hydrogen starts burning in air it produces?
The electronic configuration of an atom having atomic number 20 is
Spirit in contact with body gives cool sensation because it is:
When water itself combines chemically with some element or mineral it is called
Which of the following is used to increase the antiknocking property of petrol?
Natural rubber is the polymer of: