INFS 5115 Security Principles: Analyzing and Mitigating IoT Threats

Verified

Added on  2023/04/03

|10
|865
|302
Presentation
AI Summary
This presentation provides an overview of Internet of Things (IoT) security, defining IoT as an ecosystem of linked physical devices accessible via the internet. It explores the security issues associated with IoT, focusing on security threats such as data breaches, Denial of Service (DoS) attacks, and malware attacks, and evaluates mitigation techniques. The analysis highlights that security is a major concern for consumers, with vulnerabilities arising from unauthorized servers and inadequate security measures. Recommendations for mitigating security problems include using authentic networks, prioritizing data security, developing security policies, regularly updating software, avoiding third-party applications, adopting firewalls and antiviruses, and implementing encryption techniques. The presentation concludes that addressing security vulnerabilities and using authorized networks are crucial for enhancing IoT security, recommending that organizations like Cisco Talos prioritize security and develop comprehensive privacy plans. Desklib is a platform where students can find similar solved assignments and study resources.
Document Page
Internet of things
(IoT) Security
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Introduction
O The term IoT is defined as the internet
of thing which is an ecosystem of
linked physical devices which are
accessible by using the internet.
O It is a type of system which is used for
interconnecting computing devices
with each other.
O The aim of this presentation is to
explore the security issues linked to IoT
and evaluate the mitigation
techniques.
O IoT plays an important part in the field
of computer networks where it helps
consumers for controlling devices from
any location (Ashraf, and Habaebi,
2015).
(Source: Ashraf, and
Habaebi, 2015)
Document Page
Background
O This study mainly focuses on the security threats
occurred on the internet of thing.
O It is identified that security and privacy of data
both are very common problems associated with
IoT devices.
O Generally, IoT uses internet connectivity for
exchanging information which also increases
several security risks in IoT such as data breach,
DOS attack, malware attack and so on.
O All these attacks and issues will be discussed in
this presentation and identify the risk factors
linked with IoT technology.
Document Page
Analysis
O It is analysed that security is the biggest
concern faced by consumers while using IoT
devices.
O Due to security risks companies and users can
suffer from the data breach related issues.
O A recent study argued that lack of security
and use of unauthorized servers both are
major risk factors.
O These risk factors increase the problem of
cyber-attacks in IoT (Dabbagh, and Rayes,
2019).
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Analysis
(Security issues)
O There are various security risks
occurred in the internet of
thing which are described
below:
O Data breach
O DOS attack
O Malware attack
O Data Authentication
O Phishing attack (Vilalta, et al.,
2016).
O Cisco Talos is one of the best
examples which were suffered
from data breach while using
IoT devices.
(Source: Vilalta, et al., 2016).
Document Page
Analysis
(Security issues)
O Data breach
O It is a common vulnerability occurred in IoT where
criminals attack on the communication systems.
O In which consumers access unwanted links and
websites in their system which increase the issue of
the data breach.
O DOS attack
O It is a denial of service attack which is a cyber attack
where hackers produce a huge amount of traffic
signals using botnet process.
O Moreover, transfer these signals to the networks of IoT
that reduce the security of devices and help attackers
for accessing data of users (Lin, et al., 2017).
Document Page
Analysis
(Security issue)
O Malware attack
O It is a part of cyber-crimes where attackers use malware software
for performing activities on the user’s IoT devices.
O In which attackers produce viruses for reducing the performance of
IoT networks and block the private details of users.
O Data authentication
O The main problem of users is that they use unauthentic servers
while using IoT devices which impact on the data of users.
O Lack of proper authentication enhances the rate of data loss in the
IoT.
O Phishing attack
O In which hackers send the fraud links and spam mails to the users
in order to access their computer and IoT devices.
O Consumers access these fraud links using IoT devices which impact
on the performance of the internet of things and lead the issue of a
data breach (Banerjee, Lee, and Choo, 2018).
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Validity of arguments
(mitigation tools or
recommendation)
O There are the following recommendations can
be used for mitigating security problems:
O Use only authentic networks
O Consumers should focus on the security of data
O Companies should develop security policies
while using IoT devices
O Update computer software on regular basis
O Avoid third party applications and fraud links
O Adopt firewall and antiviruses
O Design and implement encryption technique
while exchanging information
Document Page
Validity of arguments
(Conclusion)
O From this study, it is concluded that the lack of
proper security and utilization of unauthorized
networks can lead the security issues in IoT.
O This research identified and the security risks
faced by consumers while using IoT devices.
O It is identified that malware and DOS both are
very common security issues occurred in IoT.
O It is recommended that Cisco Talos and other
organizations should focus on security and
develop proper privacy plans while using IoT
devices.
Document Page
References
O Ashraf, Q.M. and Habaebi, M.H., (2015) Autonomic schemes for threat
mitigation in Internet of Things. Journal of Network and Computer
Applications, 49(2), pp.112-127.
O Dabbagh, M. and Rayes, A., (2019) Internet of things security and
privacy. In Internet of Things From Hype to Reality, 12(2), pp. 211-238.
O Banerjee, M., Lee, J. and Choo, K.K.R., (2018) A blockchain future for
internet of things security: A position paper. Digital Communications
and Networks, 4(3), pp.149-160.
O Lin, J., Yu, W., Zhang, N., Yang, X., Zhang, H. and Zhao, W., (2017) A
survey on internet of things: Architecture, enabling technologies,
security and privacy, and applications. IEEE Internet of Things
Journal, 4(5), pp.1125-1142.
O Vilalta, R., Ciungu, R., Mayoral, A., Casellas, R., Martinez, R., Pubill, D.,
Serra, J., Munoz, R. and Verikoukis, C., (2016) Improving security in
internet of things with software defined networking. In 2016 IEEE
Global Communications Conference (GLOBECOM), 10(6), pp. 1-6.
chevron_up_icon
1 out of 10
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]