Portia Mngqibisa - 14443919 - 0

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 9

Names: Portia

Surname: Mngqibisa

Student No: 16682440

Module code: ais2604

Assignment 1

1
Question 1

1. Engineering/Technical Perspective: According to a study by Al-Fuqaha et al.


(2015), IoT is defined as a dynamic global network infrastructure with self-configuring
capabilities based on standard and interoperable communication protocols where
physical and virtual "things" have identities, physical attributes, and virtual
personalities and use intelligent interfaces and are seamlessly integrated into the
information network.

2. Business/Management Perspective: From a business perspective, the IoT is seen


as a means to create new revenue streams and business models. According to a
report by McKinsey Global Institute (2015), IoT has the potential to create economic
value through improved asset utilization, increased productivity, and reduced costs
across various industries.

3. Social Sciences/Humanities Perspective: From a socio-cultural perspective, IoT is


examined in terms of its impact on society, privacy, and human behavior. In their
research, Guillemin and Friess (2013) discuss the social implications of IoT,
including concerns about privacy, security, and surveillance in a hyper-connected
world.

(b) Examples of Smart IoT Devices for Libraries:

RFID (Radio-Frequency Identification) Tags: RFID technology automates library


operations such as inventory management and self-checkout systems. For instance,
RFID tags embedded in library books allow for efficient tracking and monitoring of
borrowing activities, reducing staff workload and enhancing user experience.

Smart Shelves: These shelves equipped with sensors monitor book usage and
organize materials based on popularity or categorization. Libraries can utilize smart
shelves to optimize space utilization, improve collection management, and provide
personalized recommendations to patrons based on their browsing habits.

2
Environmental Monitoring Systems: IoT sensors measure environmental factors like
temperature, humidity, and air quality to ensure optimal conditions for preserving
library materials and providing a comfortable environment for patrons. By monitoring
environmental parameters in real-time, libraries can prevent damage to sensitive
materials and maintain a conducive study atmosphere.

Smart Lighting Solutions: IoT-enabled lighting systems adjust brightness levels and
energy consumption based on occupancy and natural light conditions. Libraries can
implement smart lighting solutions to enhance energy efficiency, reduce operational
costs, and create a welcoming ambiance for users.

Occupancy Sensors: These sensors track the utilization of library spaces and
seating arrangements, allowing libraries to optimize resource allocation and improve
user experience. By analyzing occupancy data, libraries can identify peak hours,
allocate staff resources effectively, and implement social distancing measures during
crowded periods.

(c) Utilizing social media for Library Marketing:

1. Facebook: Libraries can create Facebook events for upcoming workshops, author
talks, or book clubs, and invite users to attend. They can also share photos, videos,
and testimonials to showcase library resources and services.

2. Twitter: Libraries can use Twitter to share quick updates, links to relevant articles
or research, and engage in conversations with users using trending hashtags related
to library topics or academic interests.

3. Instagram: Libraries can leverage Instagram to visually promote library events,


exhibitions, and new book arrivals through high-quality images and short videos.
They can also run contests or challenges to encourage user-generated content and
interaction.

4.LinkedIn: Libraries can utilize LinkedIn to connect with faculty, researchers, and
3
professionals in the academic community, share research guides or scholarly
articles, and highlight library services tailored to academic needs.

5. YouTube: Libraries can create instructional videos, virtual tours, or book trailers to
engage users and provide valuable content. They can also collaborate with faculty
or student groups to produce educational content related to research and information
literacy skills.

4
Question 2

(a) According to Narayanan et al., (2018: 354) claims that cybersecurity threat refers
to any potential danger or malicious activity that targets computer systems,
networks, or data, aiming to compromise their integrity, confidentiality, or availability.
Cybersecurity threats encompass various forms of attacks, including malware
infections, phishing scams, data breaches, and denial-of-service (DoS) attacks,
which pose significant risks to the security and functionality of library systems and
networks.

(b) Firewall Implementation: Deploying robust firewalls helps control incoming and
outgoing network traffic, filtering out malicious connections and unauthorized access
attempts. By configuring firewall rules and regularly updating firewall software,
libraries can mitigate the risk of intrusion and protect sensitive data from
unauthorized access (Farid, Warraich & Iftikhar, 2023).

Regular Software Updates: Ensuring timely updates for operating systems,


applications, and security patches helps address known vulnerabilities and
strengthens defense mechanisms against cyber threats. By implementing automated
patch management systems and conducting regular vulnerability assessments,
libraries can reduce the likelihood of exploitation by cyber attackers.

Employee Training and Awareness: Educating library staff about cybersecurity best
practices, such as identifying phishing emails, creating strong passwords, and
adhering to data security protocols, is essential for preventing human errors and
insider threats. By conducting cybersecurity awareness training sessions and
simulated phishing exercises, libraries can enhance staff vigilance and
responsiveness to potential threats.

Data Encryption: Implementing encryption protocols for sensitive data stored on


library servers or transmitted over networks helps prevent unauthorized access and
data breaches. By encrypting confidential information, such as patron records and
financial transactions, libraries can safeguard data confidentiality and maintain
5
compliance with privacy regulations.

Incident Response Planning: Developing comprehensive incident response plans


and disaster recovery strategies enables libraries to mitigate the impact of
cybersecurity incidents and minimize downtime. By establishing incident response
teams, defining communication protocols, and conducting regular drills, libraries can
effectively respond to security breaches and restore normal operations in a timely
manner.

(c) Malware Infections: Malicious software, including viruses, worms, and


ransomware, can infect library systems and disrupt operations by encrypting data or
stealing sensitive information( Razzaq et al., 2013)

Phishing Attacks: Cybercriminals use deceptive emails or websites to trick library


staff into disclosing login credentials or downloading malware, compromising system
security and user privacy.

Data Breaches: Unauthorized access to library databases or repositories exposes


patron information, such as personal identifiers or borrowing records, to theft or
exploitation.

Denial-of-Service (DoS) Attacks: Overloading library servers or networks with


malicious traffic disrupts service availability, causing downtime and hindering user
access to digital resources.

Insider Threats: Disgruntled employees or contractors may misuse their access


privileges to steal confidential information or sabotage library operations, posing
significant risks to data integrity and system security( Zadeh, Jeyaraj & Biros, 2020).

Social Engineering Attacks: Cyber attackers manipulate human behavior through


social engineering tactics, such as pretexting or baiting, to gain unauthorized access
to library systems or compromise sensitive information.

6
Zero-Day Exploits: Vulnerabilities in software or hardware that are unknown to
vendors or developers can be exploited by cybercriminals to launch targeted attacks
against library systems, bypassing existing security controls.

Advanced Persistent Threats (APTs): Sophisticated cyber adversaries employ


stealthy and persistent techniques to infiltrate library networks, evade detection, and
maintain long-term access for espionage or data theft purposes.

Supply Chain Attacks: Cyber attackers compromise third-party vendors or suppliers


associated with library systems or services to infiltrate networks, inject malicious
code, or steal sensitive data.

Physical Security Breaches: Unauthorized access to library facilities or equipment


poses risks to data confidentiality and system integrity, as physical tampering or theft
can compromise the security of network infrastructure or storage devices.

These examples highlight the diverse nature of cybersecurity threats facing libraries
and underscore the importance of implementing proactive measures to safeguard
against potential risks and vulnerabilities.

7
References:
Al-Fuqaha, A., Guizani, M., Mohammadi, M., Aledhari, M., & Ayyash, M. (2015).
Internet of Things: A survey on enabling technologies, protocols, and applications.
IEEE Communications Surveys & Tutorials, 17(4), 2347-2376.
McKinsey Global Institute. (2015). The Internet of Things: Mapping the value beyond
the hype. Retrieved

from https://www.mckinsey.com/~/media/McKinsey/Business%20Functions/McKinse
y%20Digital/Our%20Insights/The%20Internet%20of%20Things%20The%20value%2
0of%20digitizing%20the%20physical%20world/MGI-The-Internet-of-things-Mapping-
the-value-beyond-the-hype.ashx
Guillemin, P., & Friess, P. (2013). Internet of things strategic research roadmap. In
Internet of Things—Global Technological and Societal Trends (pp. 9-52). Springer,
Berlin, Heidelberg.

Farid, G., Warraich, N. F., & Iftikhar, S. (2023). Digital information security
management policy in academic libraries: A systematic review (2010–2022).
published in the Journal of Information Science.

Narayanan, S. N., Ganesan, A., Joshi, K., Oates, T., Joshi, A., & Finin, T. (2018).
Early detection of cybersecurity threats using collaborative cognition. presented at
the 2018 IEEE 4th International Conference on Collaboration and Internet
Computing (CIC).

Razzaq, A., Hur, A., Ahmad, H. F., & Masood, M. (2013). Cyber security: Threats,
reasons, challenges, methodologies and state of the art solutions for industrial
applications. presented at the 2013 IEEE Eleventh International Symposium on
Autonomous Decentralized Systems (ISADS).

Zadeh, A. H., Jeyaraj, A., & Biros, D. (2020). Characterizing cybersecurity threats to
organizations in support of risk mitigation decisions. e-Service Journal.

8
Annexure B: DECLARATION
Assignment 01 2024
I declare that this is my own, original work prepared specifically for module AIS2604
and that all the sources I have used or quoted have been indicated and
acknowledged by means of complete reference.
(Signature)

P. MNGQIBISA
(Name)
Portia Mngqibisa
(Date)
29/03/2024

Powered by TCPDF (www.tcpdf.org)

You might also like