logo

Leading Communication Technology

   

Added on  2022-09-12

5 Pages2088 Words16 Views
Security issues in IoT
April 9, 2020
Abstract
IoT is a leading communication technology that helps to link physical
devices with computing systems and transfer data from one server to an-
other easily. Many companies are using IoT enabled devices due to their
ability to manage communication gaps and enhance business performance
in a reliable manner. Security is a serious problem connected with the
IoT devices due to which the companies are suffering from cyber-crimes
and security vulnerabilities. This paper focuses on the security attacks
linked with the IoT and conduct systematic literature for obtaining ef-
fective points. It is found that malware, DDoS, ransomware and MITM
are major attacks faced by the companies due to IoT networks. So, it is
suggested that business communities should implement firewall and en-
cryption based networks for protecting data and securing IoT systems.
1 Introduction
IoT refers to the IT technology which is capable to interconnect multiple com-
puting devices and networks with each other and exchange data effectively.
Using IoT based systems; companies can implement effective communication
systems and connect physical devices with the computing networks. In this
modern era, the uses of IoT systems are increasing quickly and help to man-
age communication related concerns and lead business performance effectively.
Security is a challenging part of IoT due to which companies are facing cyber-
attacks and security concerns. More than 60 percentage of the companies are
suffering from security attacks due to lack of awareness and presence of unau-
thorized activities (Khan, and Salah, 2018). The purpose of the paper is to
determine the security issues linked to the IoT technology. In this research a
literature review will be added for reviewing the findings of recent papers and
examining effective points about IoT security issues.
2 Literature review
It is highlighted that security threats in IoT is a common theme for the inves-
tigation and in recent years various papers were issues that will be analyzed
1
Leading Communication Technology_1
in this chapter. The contribution of the literature review is to adopt effective
points about security risks linked with IoT and address the research gaps of
previous studies.
Razzaq, et al., (2017) reported that IoT is an appropriate technology that
helps companies to develop reliable systems for leading business operations. IoT
uses wireless networks and channels which are less secured and effective where
the hackers perform hacking activities and produce data breach concern . It is
found that the IoT networks used by the companies can lead security threats due
to lack of security and presence of unauthorized signals in the servers. Alrawais,
et al., (2017) determined that security is a major limitation of IoT networks due
to which the sensitive data of the companies can be breached by transferring
the malware signals to the computing network.
There are numerous kinds of cyber-attacks occur in the IoT technology in-
cluding malware, DDoS, ransomware, phishing and many more. The presence
of such attacks can help the criminals to obtain login credentials of the com-
puting devices and access all reliable data easily. It is found that major three
risk factors leading security threats in the IoT including lack of awareness, mis-
configuration of networks and unauthorized access. In which misconfiguration
of communication network is a major concern where the hackers can send the
malicious codes and obtain the accessibility of data and companies can suffer
from the data breach problems?
Kharchenko, et al., (2016) supported this point and highlighted that most
of the hackers utilizes malicious programs which are capable to develop larger
unwanted networks or links and transfer to the communication networks linked
with IoT systems for perform hacking activities. More than 67 percentage of
the companies worldwide were suffered from malware and DDoS attacks recently
due to utilization of IoT enabled systems. So, it is highlighted that the uses of
IoT networks are beneficial for the companies but also lead the security risks
and concerns in the businesse.
Tewari, and Gupta, (2018) reported that DDoS is a leading security attack
that has the ability to reduce security of IoT networks and obtain login details
of the computing devices easily. In which the hackers uses malware tools and
transfer traffic signals to the IoT networks that helps to reduce confidentiality
and availability of data easily. Business communities are not able to detect traffic
signals from the communication systems due to which they are suffering from
the data loss issues. From previous literature, it is determined that ransomware
is a kind of cyber-attack that occur in the IoT networks used by the companies.
It is a part of malware attack in which the hackers uses malicious networks
and access the login credentials of the computing devices. After this process,
the criminals encrypt all reliable information and demand ransom from the
companies and victims which may lead ethical concerns and financial issues.
So, it is reported that the presence of security threats in IoT can lead illegal,
ethical and financial concerns in the business communities that may negatively
impact on the private data and productivity.
Yu, et al., (2018) conducted a survey and highlighted that more than 60
percentage of the participants agreed that presence of unauthorized access can
2
Leading Communication Technology_2

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Security Issues In IoT
|12
|4945
|61

Security Issues in IoT and IT Infrastructure
|18
|4683
|229

Threats to Internet of Things Devices
|18
|4722
|17

Methods to Address Cybersecurity Issues in JL Organization
|13
|2416
|109

Cyber security Attacks | Assessment 1
|7
|1374
|30

Introduction to Cyber Security
|14
|3209
|388