Question
A smart home system is compromised, and attackers
remotely control connected devices like security cameras and smart locks. Which security principle is most critical to address this breach?Solution
The attack involves unauthorized access to IoT devices, making authentication the key concern. Strong authentication measures, such as multi-factor authentication (MFA) or device-specific credentials, can prevent attackers from gaining control. Proper authentication ensures: 1. Only authorized users or systems can access IoT devices. 2. Secure communication between devices in the IoT ecosystem. 3. Reduced risk of breaches even if other vulnerabilities exist. The lack of robust authentication exposes devices to unauthorized control, which was likely exploited in this scenario. Why Other Options Are Incorrect: • A) Confidentiality: Protects data but doesn't prevent unauthorized access to devices. • B) Availability: Ensures system uptime but doesn’t address access control. • C) Integrity: Focuses on preventing data tampering, not unauthorized access. • E) Non-repudiation: Prevents denial of actions but doesn’t secure initial access.
There are two methodologies for the implementation of Six Sigma. Out of which one is DMAIC. Which of the following is not the correct expansion of the l...
Which of the following best describes the position of an investor who is under an obligation to buy the underlying asset in a futures position?
If an individual is unable to pay back the overdraft taken by him, which of the following risk is the bank facing?
What is the primary regulatory body responsible for overseeing financial institutions in Hong Kong?
The rate of interest equalization for Manufacturers and Merchant Exporters under the interest Equalization Scheme for Pre and Post Shipment Rupee Export...
Which of the following principle of HRD, the top management defining the distribution of authorities and responsibilities to the subordinates so that a ...
Which of the following statements correctly describes the requirements for filing an information memorandum under the shelf prospectus regulations?
Which of the following is the governing body for regulating and overseeing SARFAESI Act implementation?
In personal development, how does ethics contribute to decision-making?
Who chaired the committee to examine the aspects of the digital public infrastructure for the Digital Payments Intelligence Platform?