The attack involves unauthorized access to IoT devices, making authentication the key concern. Strong authentication measures, such as multi-factor authentication (MFA) or device-specific credentials, can prevent attackers from gaining control. Proper authentication ensures: 1. Only authorized users or systems can access IoT devices. 2. Secure communication between devices in the IoT ecosystem. 3. Reduced risk of breaches even if other vulnerabilities exist. The lack of robust authentication exposes devices to unauthorized control, which was likely exploited in this scenario. Why Other Options Are Incorrect: • A) Confidentiality: Protects data but doesn't prevent unauthorized access to devices. • B) Availability: Ensures system uptime but doesn’t address access control. • C) Integrity: Focuses on preventing data tampering, not unauthorized access. • E) Non-repudiation: Prevents denial of actions but doesn’t secure initial access.
What was the theme for Nasha Mukt Bharat Abhiyaan Run on the occasion of international day against drug abuse this year?
Which private sector bank has launched a service recently where customers can make transactions using just their voice as a means of authentication?
The Directorate General of Foreign Trade (DGFT) has extended the deadline for implementing the Track and Trace system for pharmaceutical and drug export...
In which city was the 2024 UNESCO/Guillermo Cano World Press Freedom Prize awarded to Palestinian journalists covering Gaza?
Who is the recently appointed Chairman and Managing Director of NHPC Ltd?
Which country retained the World Squash Championship 2023 title by defeating Malaysia?
What is the aim of the MoU signed between Namami Gange and 49 universities?
Who is Surekha Yadav and what is her recent achievement in the field of locomotive piloting?
Petr Pavel has been elected President of which country?
Who won the Miami Open men's singles tennis title in 2023?