Start learning 50% faster. Sign in now
The attack involves unauthorized access to IoT devices, making authentication the key concern. Strong authentication measures, such as multi-factor authentication (MFA) or device-specific credentials, can prevent attackers from gaining control. Proper authentication ensures: 1. Only authorized users or systems can access IoT devices. 2. Secure communication between devices in the IoT ecosystem. 3. Reduced risk of breaches even if other vulnerabilities exist. The lack of robust authentication exposes devices to unauthorized control, which was likely exploited in this scenario. Why Other Options Are Incorrect: • A) Confidentiality: Protects data but doesn't prevent unauthorized access to devices. • B) Availability: Ensures system uptime but doesn’t address access control. • C) Integrity: Focuses on preventing data tampering, not unauthorized access. • E) Non-repudiation: Prevents denial of actions but doesn’t secure initial access.
Which of the following is not a function of Auxin?
The fruit of mustard is termed as
Who recommends MSP to governenment of india?
Crop failure due to prolonged dry spells during crop period and less than 75 days of crop growing season are the characteristics of which type of farming?
Which of the following technology is not used in precision farming?
Urea contains nitrogen in
Agronomy is a ____ word.
Which disease is known as cancer of wheat?
In symbiotic relationship between plant and bacteria
The common syndrome or Managoliam idiocy is also known as: