Cyber Security: Analysis of IoT Attacks and Safeguarding Technologies

Verified

Added on  2023/06/11

|5
|888
|360
Report
AI Summary
This report provides an overview of Internet of Things (IoT) security, focusing on common attacks such as eavesdropping, privilege escalation, and brute force. It introduces the components of IoT security, including physical security, data at rest, and device authentication, and discusses how IoT attacks compromise these systems. The report details the working mechanisms of each attack, explaining how hackers exploit vulnerabilities to steal data or gain unauthorized access. It also examines real-world examples where these attacks have been successful, such as eavesdropping attacks on Amazon devices and brute force attacks on the Canadian Revenue Agency, highlighting the reasons for their success, including weak network security and poor password management. Furthermore, the report discusses technologies to be used as safeguards against these attacks, such as personal firewalls and VPNs for eavesdropping, intrusion detection and prevention systems for privilege escalation, and strong password policies and two-factor authentication for brute force attacks. The report concludes by emphasizing the importance of understanding these threats and implementing appropriate prevention technologies to protect IoT systems.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Cyber Security
Principles
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Table of Contents
INTRODUCTION...........................................................................................................................1
Introduce the components of IoT security..............................................................................1
An introduction IoT attacks compromising the IoT security.................................................1
Overview of three IOT attacks.........................................................................................................1
Choose any three IoT attacks and provide an overview.........................................................1
Variants of IOT attacks....................................................................................................................1
Discuss the main reasons for these selected IoT attacks being successful.............................1
Working mechanisms.......................................................................................................................2
Briefly discuss the working mechanism of all these attacks..................................................2
Discuss technologies to be used
as a safeguard against these attacks.......................................................................................2
CONCLUSION................................................................................................................................2
References........................................................................................................................................3
Document Page
INTRODUCTION
Introduce the components of IoT security
Internet of things is defined as the using of the physical objects containing sensors and
processing ability along with the software and other technologies which connects and shares the
data with other systems with the help of internet and communication networks also. It's security
has several components such as physical security, data at rest, chip security, service boot and
device authentication or device identity (Raimundo and Rosário, 2022).
An introduction IoT attacks compromising the IoT security
Internet of things attack which compromises the internet of things systems includes
devices and networks along with the data and users. Cybercriminal launches the IOT attack in
order to steal the information with the motive of money or some personal reasons. They can even
take over the systems and automation and shut it down (Lee, 2020).
Overview of three IOT attacks
Choose any three IoT attacks and provide an overview
Eavesdropping attack is the attack in which the hacker monitor the networks which are
targeted in order to steal the personal data. It exploits the security loopholes and makes the
connections weaker among the server and the IOT devices. Privilege escalation attack is the
attack in which the hacker obtains the unauthorised access of privileges to access the data. Brute
force attack is the attack in which hackers cracks the passwords to access the data (Matheu,
Hernandez-Ramos, Skarmeta and Baldini, 2020).
Variants of IOT attacks
Discuss the main reasons for these selected IoT attacks being successful
Amazon company has faced the eavesdropping attack and the reason of being it success
is such that it use the digital assistants in an excessive manner with low network security
concern. Windows sticky keys and windows sysinternals along with the process injection and
linux password user enumeration are the real life examples of Privilege Escalation Attack.
Canadian Revenue Agency has suffered the Brute force attack and it was successful due to the
lack of strong password management within an organization (Salam, 2020).
1
Document Page
Working mechanisms
Briefly discuss the working mechanism of all these attacks
Working mechanism of eavesdropping is such that hackers makes use of the unsecured
network to capture the data. Working mechanism of Privilege Escalation Attack is such that
hackers codes for the unauthorised access to capture the data. Working mechanism of Brute
force attack is such that hackers makes use of the weak passwords management to capture the
data (Matheu, Hernandez-Ramos and Skarmeta, 2019).
Discuss technologies to be used
as a safeguard against these attacks
Using personal firewall and using virtual private network are used against eavesdropping.
Intrusion detection system and intrusion prevention system are used against Privilege Escalation
Attack. Strong password policy, enabling two factor authentication and blocking malicious IP
addresses are used against Brute force attack (Choo, Gai, Chiaraviglio and Yang, 2021).
CONCLUSION
It is concluded that eavesdropping, Privilege Escalation Attack and Brute force attack are
the most common attacks of IOT faced by real time organizations in the recent times. Hence, the
above discussion covers the impact of attacks and prevention technologies as well.
2
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
References
Books and Journals
Choo, K.K.R., Gai, K., Chiaraviglio, L. and Yang, Q., 2021. A multidisciplinary approach to
Internet of Things (IoT) cybersecurity and risk management. Computers & Security, 102,
p.102136.
Lee, I., 2020. Internet of Things (IoT) cybersecurity: Literature review and IoT cyber risk
management. Future Internet, 12(9), p.157.
Matheu, S.N., Hernandez-Ramos, J.L. and Skarmeta, A.F., 2019. Toward a cybersecurity
certification framework for the Internet of Things. IEEE Security & Privacy, 17(3), pp.66-
76.
Matheu, S.N., Hernandez-Ramos, J.L., Skarmeta, A.F. and Baldini, G., 2020. A survey of
cybersecurity certification for the internet of things. ACM Computing Surveys
(CSUR), 53(6), pp.1-36.
Raimundo, R.J. and Rosário, A.T., 2022. Cybersecurity in the Internet of Things in Industrial
Management. Applied Sciences, 12(3), p.1598.
Salam, A., 2020. Internet of things for sustainability: perspectives in privacy, cybersecurity, and
future trends. In Internet of Things for sustainable community development (pp. 299-327).
Springer, Cham.
3
chevron_up_icon
1 out of 5
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]