IPv6 and IoT SWOT Analysis
The integration of any new technology into an existing information system must be economically and technologically justified. A SWOT analysis could be a perfect strategy to justify the impact of the IPv6 protocol on ShareStream’s information system. The SWOT analysis of IPv6 protocols is carried out in the table below to justify its implementation in ShareStream’s information systems.
IPv6 SWOT Analysis Table
Strengths:
o The IPv6 protocol has a significantly larger address space (Kunc et al., 2012). As such, it allows unlimited growth of the number of internet users, a key factor in the continued economic growth of an organization. o The IPv6 protocol improves routing effectiveness by decreasing the size of routing tables through the hierarchical arrangement of address space (Kunc et al., 2012). As a result, the period of functioning of the system equipment increases. o The IPv6 protocols improve the effectiveness of the functioning of multimedia applications by providing a direct connection between optional nodes (Kunc et al., 2012). There is also enhanced security due to improved quality of services and mobility of system nodes.
|
Opportunities:
o The IPv6 protocols offer the possibility of developing improved applications that may improve the operations of ShareStream’s information systems, thus delivering economic value. o The IPv6 protocols provide an opportunity to surrender some of the operations to the network layer, thus lowering information systems services costs (Kunc et al., 2012). For instance, privacy, integrity, and authentication of data could be achieved by AH and ESP protocols under IPv6. o The IPv6 protocols support the mobility of nodes, offering an opportunity for ShareStream to accelerate the fusion of services (Kunc et al., 2012). As such, employees could run business services from anywhere while accessing business-level features. |
Weaknesses:
o The IPv6 protocols are not directly compatible with the IPv4 protocols (Kunc et al., 2012). Thus, there is a need to ensure the compatibility of all the hardware and software with this new version of internet protocols, which may cost the organization. o The sensibility of replacing IPv4 protocols with IPv6 protocols has raised doubt among some internet users (Kunc et al., 2012). Some users prefer IPv4 protocols since it has proven to be quite adjustable. It may take some effort to convince such users of the usefulness of IPv6 protocols over IPv4 protocols.
|
Threats:
o There is a threat of incompatibility and a lack of support for IPv6 protocols for individual functionalities (Kunc et al., 2012). As such, there is a likelihood that the deployment of protocols could present challenges. o Deployment of IPv6 protocols may take longer, be costlier, and increase the security risk of the existing information systems due to lack of experience and insufficient enlightenment of the users (Kunc et al., 2012). Additionally, the staff may be an obstacle in implementing the IPv6 protocols due to a lack of education.
|
The Internet of Things (IoT) technology collects, analyzes, and uses data to derive a useful business output. While some organizations see the value of this technology and have already implemented it in their operations, others are skeptical about the technology’s security concerns. A SWOT analysis could justify the implementation of the Internet of Things technology while pointing out areas that the business should be keen on.
IoT SWOT Analysis Table
Strengths:
v IoT technology is useful in streamlining business operations by intelligently prioritizing important operations while halting others (Frue, 2019). As such, most efforts will be directed to the most critical tasks in optimizing business operations. v IoT technology saves business operations costs since the devices consume fewer resources (Frue, 2019). For instance, sensors could be utilized to halt processes that are no longer needed to save resources. A good example is light sensors, which could turn off lights when not in use, thus reducing electricity consumption. v Smart IoT devices represent an innovation that opens the way for future technology (Frue, 2019). For instance, the technology could be applied in autonomous vehicles that can drive around the streets without human assistance. The technology is likely to open the way to more exciting innovations.
|
Opportunities:
v IoT technology provides an opportunity for ShareStream to invest in devices that could improve the health of its employees (Frue, 2019). For instance, the organization may invest in health-related apps which collect information about its employees. As such, handling health-related issues could be more comfortable. v IoT technology provides an opportunity for ShareStream to invest in almost any business they desire (Frue, 2019). Since the technology is still in its infant stage, anything could be possible as it progresses towards maturity. Thus, the organization must leverage the opportunities presented by this technology.
|
Weaknesses:
v One of the significant weaknesses of IoT technology is the lack of security (Frue, 2019). IoT technology is exposed to exploitation by hackers. Hackers efficiently utilize the vulnerability in the IoT firmware to access sensitive information, which they can use to harm the organization. v Each device in the IoT technology collects data, which is to be stored and analyzed to provide services (Frue, 2019). The data collected by all the connected devices are so much, and the existing infrastructure may not be the best to handle such a large volume of data.
|
Threats:
v Hackers are one of the most significant threats facing IoT technology (Frue, 2019). Since there are many devices connected to data stores and accessing the information simultaneously, a hacker may exploit the vulnerability in any of the devices to gain access to valuable business information. v As a new technology, an organization is facing the threat of spending too much in implementing IoT (Frue, 2019). For instance, the cost of purchasing a single, smart bulb may be three times the cost of a normal bulb. The high cost of implementation may be a threat to the adaption of this technology.
|
What can be done to overcome these factors?
The main issues facing the implementation of IPv6 protocols include compatibility, enlightenment, and cost. Therefore, the research team must ensure that all the devices purchased by ShareStream are compatible. Additionally, there is a need for enlightenment programs to ensure that staff is well educated on IPv6 protocols and their role in ensuring successful implementation. There should be efforts to combat security vulnerabilities experienced in IoT technology. For instance, the firmware of IoT technology should be strengthened, and any vulnerability issues sorted out. There is also a need to ensure that the infrastructure in place can support the data collected by various devices in the organization. Finally, there is a need for government support in implementing IPv6 technology (Lacnic, 2017). Such government initiatives could encourage companies to implement IPv6 technology.
Integration Issues
Some of the equipment that is supported by IPv4 technology may not be compatible with IPv6 technology. Therefore, there may be a need to purchase IPv6-ready equipment. The information systems topology may need to be upgraded to support IPv6 technology (Oracle, 2012). After upgrading to IPv6 technology, some of the applications may not readily turn on IPv6 support. Technicians may need to carry out system configurations for such applications to turn on IPv6 (Oracle, 2012). There is a likelihood of server issues since some clients may need IPv4 and IPv6 services, which leads to server-side confusion.
IoT technology involves integrating various devices, data integration, back-end system integration, and third-party integration (Cardoza, 2017). Most of the devices on the market do not have an assurance of integration. There is a danger that ShareStream may spend money on purchasing devices that may end up being uninterpretable. Thus, there is a need for the research team to ensure that all the smart devices can integrate and share data in the organization’s information systems.
References
Cardoza, C. (2017). Solving the Internet of Things integration problem – SD Times. SD Times. Retrieved 27 May 2020, from https://sdtimes.com/developers/solving-internet-things-integration-problem/.
Frue, K. (2019). SWOT Analysis of the Internet of Things. PESTLE Analysis. Retrieved 27 May 2020, from https://pestleanalysis.com/swot-analysis-of-the-internet-of-things/.
Kunc, U., Pepelnjak, I., Sterle, J., Istenič, M., Kobal, A., & Lisec, S. et al. (2012). : Transition to IPv6 (Guidelines for Deliberation on the National IPv6 Strategy). Go6.si. Retrieved 27 May 2020, from https://go6.si/docs/Study_MVZT_IPv6_en.pdf.
Lacnic. (2017). LACNIC NEWS. Prensa.lacnic.net. Retrieved 27 May 2020, from https://prensa.lacnic.net/news/en/ipv6-en/the-biggest-challenge-for-ipv6-is-overcoming-obstacles-among-business-leaders.
Oracle. (2012). Common Problems When Deploying IPv6 – Oracle Solaris Administration: IP Services. Docs.oracle.com. Retrieved 27 May 2020, from https://docs.oracle.com/cd/E23824_01/html/821-1453/ipv6-troubleshoot-2.html.
ORDER A PLAGIARISM-FREE PAPER HERE
We’ll write everything from scratch
Question
Project 5 Start Here
The world of technology is changing at an unprecedented pace, and these changes represent business opportunities as well as challenges. Mass connectivity and faster speeds create opportunities for businesses to network more devices, complete more transactions, and enhance transaction quality. Internet Protocol version 6 (IPv6) and Internet of things (IoT) are two such technologies that represent significant opportunities for strategic cybersecurity technology professionals to create lasting value for their organizations.
IoT is the phenomenon of connecting devices used in everyday life. It provides an interactive environment of human users and a myriad of devices in a global information highway, always on and always able to provide information. IoT connections happen among many types of devices — sensors, embedded technologies, machines, appliances, smart phones — all connected through wired and wireless networks.
Cloud architectures such as software as a service have allowed for big data analytics and improved areas such as automated manufacturing. Data and real-time analytics are now available to workers through wearables and mobile devices.
Such pervasive proliferation of IoT devices gives hackers avenues to gain access to personal data and financial information and increases the complexity of data protection. Given the increased risks of data breaches, newer techniques in data loss prevention should be examined.
Increased bandwidth and increased levels of interconnectivity have allowed data to become dispersed, creating issues for big data integrity. In such a world, even the financial transactions of the future are likely to be different — Bitcoin and digital currency may replace a large portion of future financial transactions.
To survive and thrive, organizational technology strategists must develop appropriate technology road maps. These strategists must consider appropriate function, protection, and tamper-proofing of these new communications and transactions.
It will be impossible to protect data by merely concentrating on protecting repositories such as networks or endpoints. Cybersecurity strategists have to concentrate on protecting the data themselves. They will need to ensure that the data are protected no matter where they reside.
Step 4: Prepare a SWOT Analysis Table
You’ve identified the technologies and devices, and listed the goals and objectives for their use in the organization. In this step, you will justify adding these devices and technologies to the network infrastructure.
In order to do this, perform a strengths, weaknesses, opportunities, and threats (SWOT) analysis of each device/technology being introduced into the infrastructure. A SWOT analysis is a framework that allows you to identify internal and external factors that can affect the implementation of new technology. Such a process can be helpful for decision making and strategic planning.
Look at internal and external factors that could influence the successful introduction with respect to the company specific business model and operations. Internal factors are the strengths and weaknesses you found. External factors are the opportunities and threats identified during the SWOT analysis. Determine what these are. Address the following questions in your discussion:
- How do they influence the operation and maintenance of the network?
- What can be done to overcome these factors?
As cybersecurity professionals, you and your team members should stress security- related analysis and create a SWOT chart that includes internal and external factors.
This chart and the overall analysis should be a significant part of the Strategic Technology Plan for Data Loss Prevention.
In the next step, you and your team members will consider any issues that might come up when you integrate and implement the new devices and technologies.
Step 5: Address Integration and Implementation issues
The team has now completed the SWOT analysis and chart, and in this step, it is time to consider integration and implementation issues you anticipate when you introduce the new devices and technologies network.
Integration issues are problems that can arise when you try to implement them into the infrastructure. These include incompatibility issues with existing software and databases, operating systems, network routers, or switches and communications protocols.
You will need to address legacy devices in the infrastructure that could cause problems with your implementation. Such devices may have older technologies and can stop working in the new environment or be unable to communicate with these new systems. You may also encounter some infrastructure issues to consider. Include such issues in your discussion.
You may want to revisit some of the early research you conducted earlier in the project when you considered the devices and technologies that would be appropriate for the Strategic Technology Plan for Data Loss Prevention.
Include the integration and implementation section in your team plan. Then, move to the next step, where you and the team members will update a data-flow diagram and consider other devices and systems that you worked on earlier in the course to be used as part of this project.