Siz Education||Internet Of Things||club 5050||10%payout to siz-official

in hive-181430 •  3 years ago  (edited)

Hello 🤗 My dear steemit Steemians


How are you all.I hope you all are happy and well.I'm wishing you all for your future and your continue success.Good Luck 🤞 for your beginning ☺️ and journey 👍.
Today I want to share a new lesson that is Internet Of Things.

Slide1.JPG

What is Internet Of Things

It is a visual connection to the internet. It could be a fitness tracker, thermostat, lock or something used - even a lamp.

Think of shoes that monitor your heart rate… and can identify potential health problems. You don't have to think - these "smart" shoes already exist!
one of the most exciting and exciting advances in information and communication technology is the advent of Internet of Things (IoT). Although communication technology has grown exponentially over the past two decades, it has until recently been severely restricted from connecting common user devices, such as mainframes, desktops and laptops, and, more recently, smartphones and tablets.

Internet-of-Things-Technology-Trends-1038x720.jpg
source
Recent years have seen the widest range of devices in the network. These include cars, household items, medical supplies, meters and electrical controls, street lights, traffic controls, smart TVs and digital assistants such as Amazon Alexa and Google Home. Industry analysts estimate that there are currently more than eight billion such devices connected to the network and the project that this number will grow to more than 25 billion by 2020. Increasingly the deployment of these devices has created new cases of using network technology. Some experts predict that IoT could generate up to US $ 13 trillion by 2025.

Industry analysts estimate that there are currently more than eight billion such devices connected to the network and predict that this number will grow to more than 25 billion by 2020.
Unlike traditional cyber programs, which connect to standard purpose computers, IoT systems often connect together special purpose-specific devices with a limited level of configuration and customization. Additionally, IoT systems tend to store and process data in a distributed way, unlike the more sophisticated way of integrating storage and computer capacity into large data centers. In addition, IoT systems are sometimes called cyber-physical systems, because unlike cyber-only systems, they include sensors that collect data from the physical world.

The dispersed environment and the presence of visible sensations create both new opportunities and vulnerability in terms of security and privacy. So far, however, the industry, end users and the education community have only begun to understand what the continuous deployment of this technology can mean and learn how to prepare for the challenges posed by this new technology environment.

Personal Status of Information Collected


One of the most distinctive features of IoT is the personal growth of collected information. Connecting cars to a network means that others can track the movements of those vehicles and how they operate. The use of smart home appliances can reveal a lot of information about the habits of residents and the way they live their lives. Attaching medical equipment to the network can bring a large amount of sensitive information about human health care. Combining multiple data sources together and using predictable statistics on resulting data can allow interested people to access incredibly detailed levels of personal information about those who use IoT devices. Interestingly, a survey of US consumers revealed that they were the ones who were most concerned about sharing information that revealed their personal habits (Rainie and Duggan 2016) .1

Extended Status of Data Storage and Processing


Another difference between IoT systems and traditional systems is usually where data is stored and processed locally. The fact that most IoT systems have low tolerance often means that they handle many data-related tasks on a local device instead of transferring all data to a central location, such as a data center.

Storing and processing data by distribution has both advantages and disadvantages. The absence of a single large multi-user data repository eliminates the existence of a large experimental target with a single attack area that can attract the attention of cyber attackers. At the same time, the preservation of different areas suggests that it is possible that some areas will not maintain adequate safety standards. Instead of relying on a single location, a strong point protected by a small team of highly trained security experts, distributed storage and processing depends on the individual users' diligence to maintain the integrity of the system.

Additionally, the lack of centralized control means that any system designer must take into account the fact that the incentives of the different actors connected to the system will vary. Although subdivisional decisions often lead to far-reaching consequences for the entire system, this is not always the case. Under certain circumstances, it may be a selfish advantage for one player to send incorrect data to the system in order to try to get bigger profits or to incur lower costs. Even if every character could convey accurate information, individual actors may find it beneficial to deviate from their expected response to that data. As a result, IoT systems require a specific method to ensure the availability and accuracy of the data and to the police that the decision-makers of the countries act in ways that are consistent with the efficiency of the entire system.

Sensors Like A New Attack Vector


Everyone who has used the Internet is well aware of the cyber attacks on computers almost daily. Viruses, worms, trojans, botnets, and other malicious software have become increasingly commonplace in cybersecurity, as well as ongoing cybercrime.
3V3rr4S3jU49uJ7YGXMfCAW8jdBAMcLpwKuDWQd3Wy8m3Rr44dBXupkbgitHNk1b8n9oKKL2UCUQqZvUcupo2oNH8FkZsBPSHJit7akZzu...HPVMVxYhRMbxuFPU4xc5QqD8vhEaXbyYwx8PVLQTXrws96fkd7G44UQiamSjzFuPA5nStfeB3Jmk5z6wHTMrLYUbXGMhanDKed6TXgmtNcWzWS7eJtbUqngzS (2).jpeg

I would like to special thanks to Sir
@cryptokraze
@siz-official
And all Siz staff who provide us an amazing plateform where we can show our skill and article about IT.

Thanks for watching my post

sa.png

Regards@salmashraf

Authors get paid when people like you upvote their post.
If you enjoyed what you read here, create your account today and start earning FREE STEEM!
Sort Order:  

Your #club5050 is expired please make a power up of your half earning and join club5050;

Report,

SteemexclusiveYes
Bit BotNo
Club5050No
PlagiarismNo
10 % to siz-officialYes

Getting started on steem can be super hard on these social platforms 😪 but luckily there is some communities that help support the little guy 😊, you might like school of minnows, we join forces with lots of other small accounts to help each other grow!
Finally a good curation trail that helps its users achieve rapid growth, its fun on a bun! check it out. https://hive.blog/steemchessboard/@steemchessboard/someeznz9em3ap