This report discusses the security and privacy issues in Internet of Things, including insecure web interface, insufficient authorization, insecure network services, and lack of transport encryption. It also provides recommendations to prevent cyber attacks and protect personal data.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Security and Privacy Issues in Internet of Things Name of the Student Name of the University
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
ABSTRACT–The Internet of things has been an ever-evolving process that has gained significance since the last decade. With the increase in use of the technology the security issues of the technology has been the only instance of problem for this platform. The internet engineer task force members have been trying to design an authentication and authorization mechanism for the devices that use Internet of Things as a platform for their mode of operation. The main reason of concern regarding the security of Internet of Things is that the attacks possessed on the Internet of Things platform affects the virtual as well as the physical infrastructure. 1.Purpose of the report This report will discuss about the main problem of security that is mainly due to the fragmentation of the platform that makes the platform less robust and enables the cyber criminals to attack the platform and gainpersonaldata.Privacyprotectionofthe computingdevicesthatusesInternetofThings requires personal configuration security settings. This report will provide literature review of the security and privacy prospective of the platform and evaluate the literature regarding the processes of overcoming theloopholesthatarepresentintheinternetof Things platform. 2.Topic: Security and privacy in Internet of Things 3.Expect format of the report Thereportwilldiscussaboutthesecurityand privacies terminology that must be maintained in order to prevent the computing devices from being attacked by the cyber criminals. The report presents a literature review of topicrelatedtothesecurityandthemaintenanceof privacy in the platform. The report discusses about the steps that must be taken in order to keep the platform free of cyber militants. The various methodologies are then discussed that must be undertaken to keep the platform protected. 4.Problem statement Unauthorized personnel gain access to the personal data of genuine clients. The privacy of the clients is at stake due to the lack of robustness of the platform. The data of a client is gained and the data is modulated in a format that causes ill effect in the clients profile and the data is modulated in order to harm the goodwill and status of the client. Introduction Rapiddevelopmentintheadvancementinthe infrastructure of the hardware and software has been the major reason behind the emergence of internet serving devices that providescompleteconnectivityfthecomputingdevices (Alrawais, Alhothaily, & Cheng, 2017). The total number of devices utilizing internet is expected to increase by a huge number in the next 20 years (Oravec, 2017, July). With an increase in growth of the Internet using devices the usage of the platform of Internet of Things has increased to a great extent. The emergence of internet of things has brought in several advantages like that of increase in the connectivity amongthecomputersthatareconnectedinthesame networking module (Li & Da Xu, 2017). With the advantage of increased connectivity, the disadvantage of less robustness of the platform comes in disguise. Despite the advantages, that the Internet of Things the only aspect of concern of this platform is the security of the platform. The aspect of data being accessed by unauthorized personnel acts to be the major threat. The challenges thrown by the cyber criminal on the platformofInternetofThingscanbedethronedbythe methodologies that are being used in daily basis. The security aspect of the data base seems to be the major concern in today’s world. The security problem regarding the social networking comes in disguise with the advantages that are been enjoyed due to the platform of Internet of things. These challenges caused by the cyber criminals in the platform of the Internet of things are both physical as well as virtual in nature. The security problems that are physical in nature consist of the hacks that include the hardware terminology and controlling the hardware without proper authentication of the user. The virtual hacks include gaining access to the personal portal of an individual without proper authentication and modulating the data in accord to harm the personnel. After performing rigorous experiments regarding the aspect of security in the field of Internet of things, procedures of facing these cyber criminals have been found out with the help of the usage of the platform of Internet of Things. After the advancement in the process of retaining, the services of the security processes in the field of Internet of Things the privacy of the users and the clients are at a better security stature. This advancement in the technology still yields loopholes that must be incarnated bytheserviceprovidersortheclientsinordertostay protected from the cyber criminals. Structure of the report with the contents of the report The report will discuss about the approach that must be taken in order to suggest the methodologies of the cyber criminals that tend to access the data in n unauthorized manner. The report will also discuss about understanding the supply chain risk of the intruders that gain access to the data without having any permit to the access data. This report will also discuss about the acknowledging the cyber criminals have possessed the address of the threat t hat in both virtual and physical ways.This reportwillfurtherdiscussaboutthesecurity methodologies that must be followed by the clients in order to keep the computing device freeform any kind of cyber crimes. This report will provide the literature review of the functioning of the Network intrusion detection technique in
order to keep the computing device free from the cyber attacks based on the platform of the Internet of things. This report will also provide the literature review of the functionality of Host Intrusion detection sensor s to keep the computing device free from cyber attacks that will be based on the platform of the Internet of Things (Ericsson, 2014). This report will ls provide the literature review of the methodologies that are undertaken in order to complete the process of cryptography and the technicality that are involved in the completion of the process of Honeypot in order to keep the computing device protected from the cyber attacks. This report will also provide the advantages and the disadvantages of the platform for the security related to the platform of Internet of Things. This report will also discuss about the future research scope of the platform with respect to the platform of the Internet of Things.
Literature Review According toLi & Da Xu, 2017,Internet of things has been gaining the global acceptance from the audience all over the globe. This global acceptance increases the usage of thetechnologyInternetofThingarenothingbutsimple electronic devices which has the transmitter and the receiver embeddedintheelectronicdevicethatenablesthemto communicate and transact over the platform of the digital communication and the internet. With the benefit of gaining the advantageof gaining communication through putthe globe comes the disadvantage of security in disguise. Security of the data base has been the major issue for the application of the Internet of things in regular life. Security Issues 1)Insecure Web Interface AccordingtoO’Neill, M. 2016,the most important aspect that affects the infrastructure of the computing system is the Web Interface of the company. The security aspect of theWebInterfaceisalsothemajorconcernforthe organizationsthataredependentonthisfeatureastheir networking system. Web interface proves to be important as it cuts as the link between the user and the computing device. An attack on the web interface allows the cyber criminal to get access on the direct interface of the networking system. Modulations made on the interface reflects instantly on the web media and the clients of the database and the web service aces a lot of problem as the data that is to be present in the web is modulated and wrong information is posted in the web leading to the conflict between the user and the employees of the organization who provide the web services. Recommendation AccordingtoKraijak&Tuwanut,2015,the methodologies that are undertaken to prevent the attack on the Web Interfaces are setting up of password and user name different from the initial username and the password that was already set during the installation if the web services. This aspect of changing the initial password and the username gives the web services robustness in the accounting of the database of the web. Another methodology that is being used in the process to protecting the web interface from the cyber criminals are by processing of the password recovery method as in case the password of the web service is changed by the cyber criminal then the genuine client can gain access of the data in the web service with the help of the restoring password methodology. Another way of terminating the risk of ten cyber attack in the web interface is by setting reference for the password so that the password that is set is well strong for the cyber criminals to harm the web interface and the gain access to the front end of the web interface. 2)Insufficient authorization AccordingtoHahn2017,theinefficient methodology that is applied in the usage of the process from securing the web services has been acting as one of the major causes for the security issues in the field of Internet of things. The computing devices that deploy the methodology of the authenticationoftheuserofthewebservicesisvery inefficient as the imposters can use the identity of the genuine clients and gain access to the web services and modulate the information that harms the clients who use the web service. This security problems facedis due to the factthatthe password complexity of the web services are not as strong as it is required for preventing the imposters to gain access to the personal accent source data that are private in nature. Another reasonofinsufficientauthenticationproblemisthat credentials of the data base are very poorly protected which matchesthecredentialsvulnerabletotheimposters.The authentication systems that are applied in the data base are one factor authentication system. The ability of the one factor authentication is limited and v the robustness of the platform is affected due to this terminology of one factor authentication methodology.Insecurityinthepasswordrecovery methodology is availed due to the fact the lack of robustness in the setting of the password. The control of rile based access is not well maintained which leads to the fact of lack of authentication robustness of the data base. Recommendation According toHu, 2016,The password that is being set for the database has to be strong enough to be cracked by the imposters in order to keep the database protected from the imposters are by ensuring that the password that s et for the data base is strong enough to be cracked. To prevent the access of the imposters the most important thing that should be checked is the positioning of the granular access control. To keep the data base protected the granular access control must be placed in the right place and the use of the granular access control, us be made efficiently. The password that is set for the database must be recoverable by the client in case of misplacing the password. 3)Insecure Network Services According toLi & Da Xu, 2017,Insecure Network services deals with the methodologies that are caused due to the vulnerabilities of the networking system that requires InternetofThingsintheprocessoftheinfrastructural methodology. The platform of Internet of Things provides the intruders the access in an unauthorized manner to the data that is associate in nature. Vulnerable services that are provided by the Internet of Things are proven to be the main reason behind the lack of robustness of the network services. Another main reason of this lack of robustness of the platform is the buffer over flow of the networking services. The overflow of the buffer provides the imposters an opportunity to gain access t the personal data of the clients who has been using the platform network services for the transaction purpose. The
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
majorreasonbehindtheimproperaccessofdatainthe networking services are the opening of the ports that are accessible by the means of UPnP. The UDP services that are exploitable in nature also acts as the gateway for the imposters to gain access to the data as the imposters exploits the UDP gateway to enter into the database of the clients and modulate the same. Usage of the DOS via Network Fuzzing is also the major reason of the data insecurity of the Insecure Networking services. This fuzzing of the networking infrastructure via the DS infrastructure has attracted many cyber criminals to poach against the databases that are stored in the network services. Recommendation AccordingtoO’Neill,M.2016,the recommendations that are required for the protection of the data from the in secured data services is by the means of the fact that the ports that are needed and the ports that are not in use must be closed as the data that is present in the networking system will ensure the fact that the leakage of the data from the other ports areminimizedandthedata securityand privacy is maintained. In case the ports of the database that are not in use cannot be closed due to the complications in the infrastructure of the system the entire data is passed through the UPnP. This also ensures that the data that is passed through the network is secured and the encryption of the data is efficient. The strategy of fuzzing attacks ensure the fact are diminished and the concern for the buffer over flow is taken into consideration. These recommendation ensures the fact that the data that si stored in the processing of the overflow of the buffer. . 4)Lack of Transport Encryption According toHahn 2017, this exchanges data with the Internet of Things device. In order to do this it follows an unencrypted format. This leads a way for cyber criminals to steal the data for ill purposes. Some security susceptibilities that could lead to this particular issue are as follows. The services that are unencrypted via the internet.SSL or TLS that are poorly implemented.SSL or TLS that are misconfigured. Recommendation According toHanck & Markantonakis, 2015,the recommendations that must be taken in order secure the data thatareintheprocessingofthedatabaseisbythe methodologies that will include the fact that the encryption of the data includes the protocols. The mostly used protocols are namely the TLS and the SSL. This fact ensures the processing of the data that will ensure that thee encryption of the data is performed with efficiency .hence it is ensured that the data is encrypted using various protocols. Such protocols include TLS and SSL while transmitting them through networks. Another mode of prevention of the task is that the entire proprietaryoftheencryptionmodeiscontrolledbythe accepted module of the TLS and the SSL module. To ensure that the encryption techniques used for protecting data while transportingareacceptedandnotproprietaryencryption protocols. 5)Privacy Concerns AccordingtoPremnath&Haas,2015,privacy concerns are faced when personal data is collected but not well secured. It can be discovered by reviewing the data that has been collected and activates the device. The security vulnerability, which can lead to such issues, is the collection of useless personal information. The privacy concern acts to be the major problem as the data that are stored in the processing of the data by the imposters. This fact ensures the feature that the data that is present in the database gets accessed by the imposters. Recommendation: According toKraijak & Tuwanut, 2015, the recommendations that are will act helpful for the progression of the data privacy and the security of the data regarding the identification of the source of the access as this will help on tracking of the lost data and regaining the data might also be possible for the progression of the privacy. This willensure that the data collectedisde-identifiedthiswillensurethataspecific retention limit is set for collected data.The encryption of the data must be done properly. This willensure that the data collected is protected by encryption. 6)Insecure Cloud Interface AccordingtoKraija&Tuwanut,2015,itis concerned with the issues related to cloud interface which is used to interact with Internet of Things device. This would result in poor data transporting in unencrypted format. This allows an attacker the access to the data. Factors that can lead to these issues are enumeration of account, details exposed in network traffic. The traffic that is made to pass through the cloud computing networking system ensures the fact that the interface that the cloud computing format is using lacks the robustness of the infrastructure. This ensures the fact that the data stored in the cloud will ensure the fact that the data will regain the progression of the data. Recommendation: According toPremnath & Haas, 2015,some measures that can be taken to prevent them include the methodology that intend on the methodology of the resetting the password and the security instances of the database. This includes setting new passwords and the passwords resetting from that which are applied in default mode. The changing to default users and default passwords during initial setup acts helpful in the purpose of the detection of the problems. The number of attempts must be fixed in order to set the security tire for the organization. By setting the bar for the processing of the security chain it disables the imposters to guess the password of the account which in turn helps the organization to keep the database protected. This fact ensure that account logs out after several failed to login. For securing the access to the database
of the system it enables the factor that the data that is stored in the data base is supported with 2 way authentication system. This includes the factor that the data that are stored in the database of the organization is secured and the processing of the data is more difficult because of the lack of prevention of the data with respect to the processing of the security.This fact will help to ensure that personal information is not shared viainternet,implement2factorauthenticationforbetter security. 7)Insecure Mobile Interface According toLi & Da Xu, 2017, unencrypted data or weak authentication can let the attackers have the access to the data of an Internet of Things device. Factors that can lead to these factors include enumeration of account and personal details exposed in network traffic. Recommendation: According toHahn 2017, some measures to be taken to preventthesethreatsincludesensuringthatpersonal information is not shared via internet. Default passwords and usernames must changed while initial setup. 8)Insufficient Security Configurability According toLee & Lee, 2015,itis present when the users of device have no ability to change its security controls. The risk is that the Internet of Things device can be easily too attacked. This can be done by unauthorized access to the data. Factors that can lead to this threat is the lack of options in password security, no security monitoring and no security logging. Recommendation: According toHahn 2017,some measures that can be taken to prevent this kind of threats are that it separates administrative users from normal users. This will help in ensuring the ability to notify the end users of security events. This factor will also help in ensuring the ability to provide strong passwords. Insecure Software According toBertino & Ferrari, 2018, software is insecurewhentheycontainhardcodeddatasuchas credentials. The inability of a software to get updated means that the device is vulnerable to the security issue. The factors leadingtothesethreatsaretheupdatedfilethatisnot encrypted, the update is not verified before an upload and when there is no update functionality. Recommendation: According toHahn 2017,some measures that can be taken to prevent these threats are also ensures that the update server is secured. This will also help to ensure that the data has the ability to update. This will help to ensure that the updated file does not reveal any sensitive data. The factor will help ensurethatthefileis transmittedviaanencrypted connection. 9)Poor Physical Security AccordingtoO’Neill,M.2016,Poorphysical security takes place when an attacker is able to disassemble a device in order to get access to the storage medium as well as the data stored in it. The weakness can also be detected when an USB port is used to access a device that uses features intended for maintenance. The factors that causes these threats are getting access to software with the help of USB ports and removing storage media. Recommendation: According toKraijak & Tuwanut, 2015,measures to be taken to prevent these threats are ensuring that the data storage mediumis noteasilyremoved.Ensuring thatthedevice cannot be easily disassembled is also required. Ensuring that theproducthastheabilitytolimitthecapabilitiesof administrative is also required for the processing of the data. Ensuringthattheproducthastheabilitytolimitthe capabilitiesofadministrativeisalsorequiredforthe processing of the data framework. According toLi & Da Xu, 2017,Internet of Things has been here, and will be here.By 2020,Gartnerpredicts that the Internet of Things would be made up of 26 billion “units.” Themeasuresstatedabovewillbenothingif themanufacturersofInternetofThingsdevicesdonot consider them. Methodologies Internet of Things has been acting as the major source of communication among the field of the corporate sector as well as in the field of the smart citizenship f the place where the platform of internet of things is present. This ensures the fact thatwiththeintroductionoftheinternetofthings,the organization that has implemented the internet of things for thepurposeoftheprovidingefficiencyinthefieldof communication has been proving to be beneficial for the organization.Despitealltheadvantages,themajor disadvantagethattheorganizationfacesistheproblems regarding the security and privacy of the databases of the organization. This ensures the fact that the data that is stored in the database of the organization is not well protected as the framework of the database of the internet of things is not as robustasitshould be.This isduetothe factthatthe organizations do not focus on the robustness of the database as the turnover if the organization is not directly related to the robustness of the organization. The use of various methods has been made in order to make the platform of the internet of things secure and maintain the privacy of the data centre which is dependent on the robustness of the datacentre which is based in the platform of the internet of tings. Method 1 The first methodology that can be made use of for securing the data that is stored in the datacentre that has been using the platform of the internet of things. The use of strong password setting can be used to secure the unauthorized access of the
data by the cyber criminals. This ensures the fact that the data that is stored in the data base that has been using the platform of internet of things is secured from the unauthorized access of the imposters.The methodology includes the factor that the security of the database is completely dependent on the strength of the password that is set for the protection I the data that is stored in the database of the system. This ensures the fact that ate imposters cannot get the access to the data that is stored in the database that is dependent on the platform of the internet of things.In case the password that is set is strong enough the imposters cannot log into the account as decoding the password acts as the major challenge to the security of the data that are stored in the data centre of the data base that has been u sing the platform of internet of things. The strength of the password secures the fact that the data that is stored in the processing of performing a task. This strength of the password ensures the robustness of the data centre that is based on the platform of the internet of things. Method 2 Creatingpersonalportalsfortheemployeesofthe organization acts to be the major reason behind the security of the data of the employees. The data that are stored in the data centre of the database that is based on the platform of the internet of things. This personal profile creation defines the fact that the employees are liable regarding the security of their own data. The profile that is created for the employees of the organization ensures the fact that the information of the employee are stored in their personal portal which determines the fact that the security of the data of the employees are in the securityprocessthattheemployeesmaintainforthe purpose of dealing with the imposters who like to gain access to the data that are stored in the database of the system. This ensures the fact that the data that are stored in data centre which is based on the platform of the internet of things. This fact takes into consideration that the data that is stored in the procession of the accounting of the employee ensures the fact that the data that is stored in the portal of the employee is secured with proper and strong passwords that are set for the processing of the data that are stored in the platform of the database. This ensures the fact that the data that are stored in the portal of the database is concerned regarding the data of the employee. Method 3 Installing firewall acts as the major technique that ensures the factthatthedatathatisstoredinthedatabaseofthe information centre that is based on the platform of the internet of things ensures the fact that the unauthorized access to the network is prevented. This prevention leads to the fact that the data that is present in the data centre based on the platform of internet of things is protected from the unauthorized access. The firewall installation acts as the major reason behind the propagation of procuring security. This ensures the fact that the installed firewall provides a basic protection to the data that is present in the data centre based on the platform of internet of things. Despite the fact that the data is stored in the database is protected by the firewall, different elementary solutions are taken for the purpose of the protection of the data that is present in the data centre based on the platform of internet of things. The firewall protection can be vulnerable at times due to the fact that the data that is present in the data centre based on the platform of internet of things can be accessed through the software that has been created which has the ability to penetrate the protection barrier of the data base. This is because the database of the system is vulnerable as the barrier of the database is not updated and the database can be attacked by the imposters. Method 4 Real Time Password setting is used for the purpose of setting the password each and every time the client tends to log in the account of the system. This processing ensures the fact that the data that is present in the data centre based on the platform of internet of things has been facing the advantage of gaining the accessibility to the portal that will ensure the real time password ensures the fact that even if the employee forgets to log out of the networking system, the computing system automatically logs the employee off which will ensure that the data that is present in the data centre based on the platform of internet of things stays protected from the unauthenticated access to the database. This acts to be one of the safest methods for the performance of the security of the data. Method 5 Updating the software has been acting as the only way to protect the data that is present in the data centre based on the platform of internet of things. The updated versions of the database acts to be invincible by the imposters who are trying to gain access in order to gain the data from the database f the system.Theprotectionthatisprovidedbytheupdated versions of the database is not vulnerable and penetrating through the software is not possible n case the software is updated. This fact ensures that the data that is present in the data centre based on the platform of internet of things is protected from the unauthorized access form the imposters. Thishelpsthismethodtogainanedgeoverallother methodologies that are taken into consideration for keeping the data that is present in the data centre based on the platform of internet of things secured from the imposters. Comparison The comparisons among the different methodologies will act helpful in order to ensure the fact that the technology that mustbeusedprovidesthemaximumefficiency.The comparisons will be provided under the subheading of the following parameters: - Efficiency The most efficient technique for the protection of the data base is setting a strong password. This process does not need anykindofexcesseffortfromtheemployeesofthe organization as well as the organization. This is the most cost
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
efficienttechniquethatisusedforthepurposeofthe protection of the data that is present in the data centre based on the platform of internet of things. This is because no infrastructure is needed to b built in order to gain the security regarding the unauthenticated access. The processing of the data that is present in the data centre based on the platform of internet of things stays protected from the cyber criminals. Simplicity The simplest method that can be used in the processing of the storage of data is that the data that is present in the data centre based on the platform of internet of things can be protected by means of installing the firewall in the system. This is because in today’s society all the networking system comes up pre installed firewall systems. This ensures the fact that the data that is present in the data centre based on the platform of internet of things is protected from the imposters that are proclaimed to be the most threat-causing element for the data that is present in the data centre based on the platform of internet of things. Time saving in IOT Time saving has been one of the most concerned topic in today’s corporate sector. This is because the fact due to the lack of productivity of the organization \with higher demands. This fact leads to the case that the organization is unable to dedicatemuchtimeforcheckingtherobustnessofthe architecture. This reason leads to the fact that the regular updating of the software acts to be the best way to suite this kind of strategy. This ensures the fact that the data that is present in the data centre based on the platform of internet of things is protected as no further measures are taken to justify the fact that the data is always protected from the imposters in order to check the sustainability of the processing of the data. No extra effort or time is required for updating the software. The software gets auto updated and the entire data base stays protected. Security In terms of the security the most secured methodology that is used for the data that is present in the data centre based on the platform of internet of thing is the auto updating of the software. This ensures the fact that the data stays protected as the cyber criminals are unable to find the loop holes of the updated versions of the database. This method ensures that the data that is present in the data centre based on the platform of internet of things stays protected from the imposters which will lead to the case that the data stays protected. The most secured and efficient methodology that must be deployed to the data that is present in the data centre based on the platform of internet of things is updating the software in a regular basis. In this case of the software being updated in regular interval of time leads t the fact that the data that is present in the data centre based on the platform of internet of things stays protected from the cyber criminals. This fact will ensure that the data stays protected without keeping any track of the entire system. This will ensure the fact that the data stays protected withoutdoing any hard work as the update is automatically taken by the computing system. This technology acts to be the only way that will ensure the fact that the cyber criminals do not get the authentication to access the database. This is due to the fact that the loop holes of the newly updated and the latest versions of the software is not available. This method acts as the most robust strategy for the protection of the data that is present in the data centre based on the platform of internet of things. References [1.]Bertino, E. (2016, June). Data security and privacy: concepts, approaches, and research directions. InComputer Software and Applications Conference (COMPSAC), 2016 IEEE 40th Annual(Vol. 1, pp. 400-407). IEEE. [2.]Bertino, E., & Ferrari, E. (2018). Big Data Security and Privacy. InA Comprehensive Guide through the Italian Database Research over the Last 25 Years(pp. 425-439). Springer, Cham. [3.]Dalipi, F., & Yayilgan, S. Y. (2016, August). Security and privacy considerations for IoT application on smart grids: Survey and research challenges. InFuture Internet of Things and Cloud Workshops (FiCloudW), IEEE International Conference on(pp. 63-68). IEEE. [4.]Hahn, J. (2017). Security and privacy for location services and the internet of things.Library Technology Reports,53(1), 23. [5.]Hancke, G. P., & Markantonakis, K. (Eds.). (2017).Radio Frequency Identification and IoT Security: 12th International Workshop, RFIDSec 2016, Hong Kong, China, November 30--December 2, 2016, Revised Selected Papers(Vol. 10155). Springer. [6.]Hu, F. (2016).Security and privacy in Internet of things (IoTs): Models, Algorithms, and Implementations. CRC Press. [7.]Kraijak, S., & Tuwanut, P. (2015). A survey on IoT architectures, protocols, applications, security, privacy, real-world implementation and future trends. [8.]Lee, I., & Lee, K. (2015). The Internet of Things (IoT): Applications, investments, and challenges for enterprises.Business Horizons,58(4), 431-440. [9.]Li, S., & Da Xu, L. (2017).Securing the internet of things. Syngress. [10.]Maras, M. H. (2015). Internet of Things: security and privacy implications.International Data Privacy Law,5(2), 99. [11.]O’Neill, M. (2016). Insecurity by design: Today’s IoT device security problem.Engineering,2(1), 48-49. [12.]Oravec, J. A. (2017, July). Emerging “cyber hygiene” practices for the Internet of Things (IoT): Professional issues in consulting clients and educating users on IoT privacy and security. InProfessional Communication Conference (ProComm), 2017 IEEE International(pp. 1-5). IEEE. [13.]Premnath, S. N., & Haas, Z. J. (2015). Security and privacy in the internet-of-things under time-and-budget-limited adversary model.IEEE Wireless Communications Letters,4(3), 277-280. [14.]Roy, S., & Manoj, B. S. (2016). IoT enablers and their security and privacy issues. InInternet of Things (IoT) in 5G Mobile Technologies(pp. 449-482). Springer, Cham. [15.]Sajid, A., Abbas, H., & Saleem, K. (2016). Cloud-assisted iot-based scada systems security: A review of the state of the art and future challenges.IEEE Access,4, 1375-1384. [16.]Zhou, W., & Piramuthu, S. (2014, June). Security/privacy of wearable fitness tracking IoT devices. InInformation Systems and Technologies (CISTI), 2014 9th Iberian Conference on(pp. 1-5). IEEE.