logo

Emerging Threats and Counter Measurements

   

Added on  2023-01-11

4 Pages866 Words38 Views
Emerging Threats and counter measurements
Name
Institution
Professor
Course
Date
Emerging Threats and Counter Measurements_1
Abomhara, M. & Koien, G. (2015). Cybersecurity and the internet of things: vulnerabilities,
threats, intruders and attacks. Journal of Cybersecurity and Mobility, 4(1), 65-88.
The authors outline success and challenges facing the Internet of Things (IoT). Increase
in cyber threats, attacks and services has been a challenge in the technology world. It is notable
that cyber threats, intruders and vulnerabilities are significant issues affecting technology
actualization. Despite the authors’ contribution to IoT, the article does not outline a possible
legal solution to the cybersecurity challenges.
Ahmed, A. W., Ahmed, M. M., Khan, O. A., & Shah, M. A. (2017). A comprehensive analysis
on the security threats and their countermeasures of IoT. Int. J. Adv. Comput. Sci. Appl.
(“IJACSA”), 8(7), 489-501.
The article focuses on pervasive networks which are only meant to provide the required
IoT services by either analyzing or processing sets of data. The authors assert that IoT has shown
tremendous progress by creating complex interconnections of devices. The article highlights
major cybersecurity issues, possible solutions as well as future directions on IoT security.
Important to note is that authors focus on data security and privacy besides infrastructure
concerns.
Ali, B., & Awad, A. (2018). Cyber and physical security vulnerability assessment for IoT-based
smart homes. Sensors, 18(3), 817.
The authors evaluate the development and implementation of smart homes through the
use of IoT technology. The article pinpoints out that IoT technology is becoming a game changer
in the application of smart homes due its efficiency and convenience. As much as technology
improves quality of life, the article discusses security lapses such as authenticity, confidentiality,
and data integrity. The authors use OCTAVE methodology to assess security vulnerabilities in
smart homes.
Emerging Threats and Counter Measurements_2

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Application of IOT in Smart Cities Research Proposal 2022
|5
|553
|19

IoT Applications and Services - PDF
|8
|2649
|134

Threats, Attacks and Malware in IT Security - Desklib
|12
|1198
|192

Cyber Security and its Impact on IoT and Social Media
|5
|929
|287

Healthcare Networks: Security Issues and Threats Mitigation Techniques
|8
|570
|309

Utilizing Blockchain in Internet of Things
|25
|6891
|265