Skip main navigation

Get 30% off one whole year of Unlimited learning. Subscribe for just £249.99 £174.99. T&Cs apply

Design challenges

What are the major challenges associated with designing IoT applications that are inherently secure?
Security cameras on corporate building
What are the major challenges associated with designing IoT applications that are inherently secure?

Did you know that access to many security cameras is not effectively secured and that livestreams of these cameras is publicly available? For example, take a look at the Insecam live cameras website – it displays live camera footage of security cameras from all around the world. None of these devices are secured.

(Note: The Insecam site does not work on some internet browsers. It is recommended that you use Mozilla Firefox browser to watch network cameras on the Insecam site.)

Now it’s your turn

What are the major challenges associated with designing IoT applications that are inherently secure?

If needed, refer to the Code of Practice: Securing the Internet of Things for Consumers to reflect on some of the security requirements and associated challenges.

Share your thoughts in the comments.

© RMIT 2023
This article is from the free online

Security by Design

Created by
FutureLearn - Learning For Life

Reach your personal and professional goals

Unlock access to hundreds of expert online courses and degrees from top universities and educators to gain accredited qualifications and professional CV-building certificates.

Join over 18 million learners to launch, switch or build upon your career, all at your own pace, across a wide range of topic areas.

Start Learning now