Page 32 - Cyber Warnings
P. 32
some IoT analytics in order to understand your data and finally, you should take some actions
on once you’ve realized how your system operates. In other words, that final step in such a
concept should cope with the actionable-intelligence being something so useful for your strategy
formulation. Sometimes it would be sufficient to rely on some free IoT search engines such as
the Shodan and Censys in order to analyze or – in other words, better understand your IoT
environment. The next chapter of this article would attempt to deeply explain the strategic
perspectives of this concept relying on the previously mentioned concept of the actionable-
intelligence.
The strategic perspectives of this concept
So, how the strategy being formulated to improve the entire IoT experience could get correlated
with the IoT analytics and finally – the actionable-intelligence. The things here are quite simple.
If you want to deal with some intelligence being a product of well-analyzed data and information
– you would easily come to a level of the strategy formulation. Obviously – the IoT analytics
would provide us the quite useful actionable-findings that would suggest such a sort of
intelligence could serve in a deeper dealing with the entire system. In other words, the final step
in a process being Sense, Understand and Act would offer us much more information which
course of actions we should take in order to gain some sort of advantage. At the end, we
believe that the strategy is smartly formulated course of actions that should get taken in order to
obtain the certain goals.
The final thoughts
In conclusion, we would make an advice to the rest of a researcher’s community to put some
efforts on and deeply investigate this sort of a topic. Also, we believe that the similar efforts
could get used in making a better strategic approach to this field of interest. Anyhow, the point is
to make people think how to resolve a certain issue and once they gain that habit – we could
count on a progress to all.
About The Author
Since Milica Djekic graduated at the Department of Control Engineering at
University of Belgrade, Serbia, she’s been an engineer with a passion for
cryptography, cyber security, and wireless systems. Milica is a researcher
from Subotica, Serbia. She also serves as a Reviewer at the Journal of
Computer Sciences and Applications and.
She writes for American and Asia-Pacific security magazines. She is a volunteer with the
American corner of Subotica as well as a lecturer with the local engineering society.
32 Cyber Warnings E-Magazine – May 2017 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide