Literature Review: IoT Threats, Risks, and Database Security Analysis
VerifiedAdded on  2023/04/08
|5
|1145
|364
Literature Review
AI Summary
This literature review explores the security threats posed by the Internet of Things (IoT) to database security. It identifies various threats such as malware, authentication network vulnerabilities, insecure web interfaces, and phishing attacks, along with more sophisticated threats like cyber reconnaissance, brute force attacks, ransomware, and denial-of-service (DoS) attacks. The review analyzes the impact of these threats on the privacy and security of personal data, emphasizing the risks associated with IoT's increasing connectivity. The paper also highlights the importance of adopting robust security measures, including encryption, cryptography, and firewall software, to mitigate these threats and enhance database security. The annotated bibliography provides summaries and analyses of several research papers focusing on IoT security challenges and potential solutions.

IoT threats to database security
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

IOT THREATS TO DATABASE SECURITY
1
Abstract
The term IoT refers to the internet of thing which is an advanced level of
information communication technology. IoT technology provides a platform to connect
physical devices like hardware, computer devices, and mobile devices with electronic
systems. In the last three years, this technology is suffering from security threats and
risks due to consumers and organizations lost their private databases and files. The
objective of this research is to analyse the concept of IoT in database security and
describe the threats and risks associated with IoT technology. This paper focuses on the
impact of the internet of things threats and vulnerabilities on the security of the
database and techniques to improve the privacy of the consumer's database. It is
identified that there are various kinds of threats occur in the IoT which reduce and
block the database or computer devices of consumers such as malware, authentication
networks, insecure web interface, and phishing attack and so on. Recent investigation
about the IoT threats and security suggested that there are few other security threats
that occur due to the consumer on the internet of things such as cyber reconnaissance,
brute force attack on passwords, controlled attack, ransomware attack, and DoS attack.
This study shows the IoT threats and risks associated with the database security
systems and analysis their impact on private data files. It is recommended that
consumers and companies can adopt the encryption, cryptography, firewall software
and robust technique in order to reduce the threats of IoT security and improve the
privacy of personal database system.
1
Abstract
The term IoT refers to the internet of thing which is an advanced level of
information communication technology. IoT technology provides a platform to connect
physical devices like hardware, computer devices, and mobile devices with electronic
systems. In the last three years, this technology is suffering from security threats and
risks due to consumers and organizations lost their private databases and files. The
objective of this research is to analyse the concept of IoT in database security and
describe the threats and risks associated with IoT technology. This paper focuses on the
impact of the internet of things threats and vulnerabilities on the security of the
database and techniques to improve the privacy of the consumer's database. It is
identified that there are various kinds of threats occur in the IoT which reduce and
block the database or computer devices of consumers such as malware, authentication
networks, insecure web interface, and phishing attack and so on. Recent investigation
about the IoT threats and security suggested that there are few other security threats
that occur due to the consumer on the internet of things such as cyber reconnaissance,
brute force attack on passwords, controlled attack, ransomware attack, and DoS attack.
This study shows the IoT threats and risks associated with the database security
systems and analysis their impact on private data files. It is recommended that
consumers and companies can adopt the encryption, cryptography, firewall software
and robust technique in order to reduce the threats of IoT security and improve the
privacy of personal database system.

IOT THREATS TO DATABASE SECURITY
2
Annotated bibliography
Rizvi, S., Kurtz, A., Pfeffer, J., & Rizvi, M. (2018, August). Securing the Internet of
Things (IoT): A Security Taxonomy for IoT. In 2018 17th IEEE International
Conference On Trust, Security And Privacy In Computing And Communications/12th
IEEE International Conference On Big Data Science And Engineering
(TrustCom/BigDataSE), 10(2), 163-168.
This journal paper focuses on the security issues faced by the internet of thing
technology and architecture and layers of the IoT. The aim of this study is to analyse the
fundamental architecture and layers of IoT technology and security challenges on the
internet of thing. According to the researcher, there are many threats and attacks occur
in the IoT such as DoS attack, phishing attack, and network injecting, jamming, and
tampering and so on.
After reading this paper, I analysed that security is a big concern in IoT
technology because it uses internet connectivity which is associated with the threats,
data breach and hacking. By using this technique we can face the DDOS and DOS attack,
network injecting, and jamming and other security related issues. Due to all these
issues, we can lose our database, private details and information.
Andrea, I., Chrysostomou, C., & Hadjichristofi, G. (2015, July). Internet of Things:
Security vulnerabilities and challenges. In 2015 IEEE Symposium on Computers
and Communication (ISCC), 12(2), 180-187.
The objective of this paper is to describe the various kinds of attacks and threats
faced by the IoT technology and their security goals. According to the author, the use of
IoT technology is growing rapidly and it connects the electronic devices with the other
physical devices. The researcher identified that there are many attacks and threats
occur in the database security such as traffic attacks, phishing, spyware and malware
attack, virus and worms, and denial of service attack.
According to my opinion, this paper provided complete information about the
IoT security threats and attacks and they occur due to lack of security and use of
unauthentic servers. I thought that the researcher provided a platform to understand
the IoT threats and issues that impact on the security database and personal
information.
Razzaq, M. A., Gill, S. H., Qureshi, M. A., & Ullah, S. (2017). Security issues in the
Internet of Things (IoT): a comprehensive study. International Journal of
Advanced Computer Science and Applications, 8(6), 2-6.
This study aim is to highlight the security related issues of the internet of thing
and the researcher provided in-depth analysis about the IoT threats. According to the
author, the IoT allows consumers to send and receive data from one location to another
with the help of the internet but it also increases the rate of security attacks and threats.
After analysing this investigation, I identified that the development of security
protocols in IoT networks can help consumers to reduce security threats and attacks. I
2
Annotated bibliography
Rizvi, S., Kurtz, A., Pfeffer, J., & Rizvi, M. (2018, August). Securing the Internet of
Things (IoT): A Security Taxonomy for IoT. In 2018 17th IEEE International
Conference On Trust, Security And Privacy In Computing And Communications/12th
IEEE International Conference On Big Data Science And Engineering
(TrustCom/BigDataSE), 10(2), 163-168.
This journal paper focuses on the security issues faced by the internet of thing
technology and architecture and layers of the IoT. The aim of this study is to analyse the
fundamental architecture and layers of IoT technology and security challenges on the
internet of thing. According to the researcher, there are many threats and attacks occur
in the IoT such as DoS attack, phishing attack, and network injecting, jamming, and
tampering and so on.
After reading this paper, I analysed that security is a big concern in IoT
technology because it uses internet connectivity which is associated with the threats,
data breach and hacking. By using this technique we can face the DDOS and DOS attack,
network injecting, and jamming and other security related issues. Due to all these
issues, we can lose our database, private details and information.
Andrea, I., Chrysostomou, C., & Hadjichristofi, G. (2015, July). Internet of Things:
Security vulnerabilities and challenges. In 2015 IEEE Symposium on Computers
and Communication (ISCC), 12(2), 180-187.
The objective of this paper is to describe the various kinds of attacks and threats
faced by the IoT technology and their security goals. According to the author, the use of
IoT technology is growing rapidly and it connects the electronic devices with the other
physical devices. The researcher identified that there are many attacks and threats
occur in the database security such as traffic attacks, phishing, spyware and malware
attack, virus and worms, and denial of service attack.
According to my opinion, this paper provided complete information about the
IoT security threats and attacks and they occur due to lack of security and use of
unauthentic servers. I thought that the researcher provided a platform to understand
the IoT threats and issues that impact on the security database and personal
information.
Razzaq, M. A., Gill, S. H., Qureshi, M. A., & Ullah, S. (2017). Security issues in the
Internet of Things (IoT): a comprehensive study. International Journal of
Advanced Computer Science and Applications, 8(6), 2-6.
This study aim is to highlight the security related issues of the internet of thing
and the researcher provided in-depth analysis about the IoT threats. According to the
author, the IoT allows consumers to send and receive data from one location to another
with the help of the internet but it also increases the rate of security attacks and threats.
After analysing this investigation, I identified that the development of security
protocols in IoT networks can help consumers to reduce security threats and attacks. I
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

IOT THREATS TO DATABASE SECURITY
3
thought that consumers should use only authentic networks because we always use
third party networks which are developed by hackers.
Leloglu, E. (2017). A review of security concerns on the Internet of Things. Journal
of Computer and Communications, 5(1), 121-136.
This paper described the concept of IoT technology and reviewed the security
concerns in the IoT technique. In which the researcher conducted a survey for gathering
the viewpoints of experts and defined the security challenged occur in the development
of IoT.
I thought that it is very important to improve the security of IoT and identify the
key factors that increase this problem. In this paper, the researcher identified security
risks and issues by which we can analysis their impact on our private details.
Jaychand, B. N. (2017). A Survey on IoT Security Threats and
Solutions. International Journal of Innovative Research in Computer and
Communication Engineering, 5(3), 1-4.
This paper focuses on the security threats and vulnerabilities of the IoT and
steps to improve the security of IoT and networks. For better understanding, the
researcher conducted a survey and described the various security risks in the field of
IoT technology.
From this study, I found that it is very important for consumers and companies
to identify the threats and issues of IoT because we can suffer from hacking and data
breach issues. I recommended that consumers should adopt the antivirus software,
firewall, cryptography and other techniques.
3
thought that consumers should use only authentic networks because we always use
third party networks which are developed by hackers.
Leloglu, E. (2017). A review of security concerns on the Internet of Things. Journal
of Computer and Communications, 5(1), 121-136.
This paper described the concept of IoT technology and reviewed the security
concerns in the IoT technique. In which the researcher conducted a survey for gathering
the viewpoints of experts and defined the security challenged occur in the development
of IoT.
I thought that it is very important to improve the security of IoT and identify the
key factors that increase this problem. In this paper, the researcher identified security
risks and issues by which we can analysis their impact on our private details.
Jaychand, B. N. (2017). A Survey on IoT Security Threats and
Solutions. International Journal of Innovative Research in Computer and
Communication Engineering, 5(3), 1-4.
This paper focuses on the security threats and vulnerabilities of the IoT and
steps to improve the security of IoT and networks. For better understanding, the
researcher conducted a survey and described the various security risks in the field of
IoT technology.
From this study, I found that it is very important for consumers and companies
to identify the threats and issues of IoT because we can suffer from hacking and data
breach issues. I recommended that consumers should adopt the antivirus software,
firewall, cryptography and other techniques.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

IOT THREATS TO DATABASE SECURITY
4
References
Razzaq, M. A., Gill, S. H., Qureshi, M. A., & Ullah, S. (2017). Security issues in the Internet
of Things (IoT): a comprehensive study. International Journal of Advanced
Computer Science and Applications, 8(6), 2-6.
Leloglu, E. (2017). A review of security concerns on the Internet of Things. Journal of
Computer and Communications, 5(1), 121-136.
Jaychand, B. N. (2017). A Survey on IoT Security Threats and Solutions. International
Journal of Innovative Research in Computer and Communication Engineering, 5(3),
1-4.
Andrea, I., Chrysostomou, C., & Hadjichristofi, G. (2015, July). Internet of Things:
Security vulnerabilities and challenges. In 2015 IEEE Symposium on Computers
and Communication (ISCC), 12(2), 180-187.
Rizvi, S., Kurtz, A., Pfeffer, J., & Rizvi, M. (2018, August). Securing the Internet of Things
(IoT): A Security Taxonomy for IoT. In 2018 17th IEEE International Conference
On Trust, Security And Privacy In Computing And Communications/12th IEEE
International Conference On Big Data Science And Engineering
(TrustCom/BigDataSE), 10(2), 163-168.
4
References
Razzaq, M. A., Gill, S. H., Qureshi, M. A., & Ullah, S. (2017). Security issues in the Internet
of Things (IoT): a comprehensive study. International Journal of Advanced
Computer Science and Applications, 8(6), 2-6.
Leloglu, E. (2017). A review of security concerns on the Internet of Things. Journal of
Computer and Communications, 5(1), 121-136.
Jaychand, B. N. (2017). A Survey on IoT Security Threats and Solutions. International
Journal of Innovative Research in Computer and Communication Engineering, 5(3),
1-4.
Andrea, I., Chrysostomou, C., & Hadjichristofi, G. (2015, July). Internet of Things:
Security vulnerabilities and challenges. In 2015 IEEE Symposium on Computers
and Communication (ISCC), 12(2), 180-187.
Rizvi, S., Kurtz, A., Pfeffer, J., & Rizvi, M. (2018, August). Securing the Internet of Things
(IoT): A Security Taxonomy for IoT. In 2018 17th IEEE International Conference
On Trust, Security And Privacy In Computing And Communications/12th IEEE
International Conference On Big Data Science And Engineering
(TrustCom/BigDataSE), 10(2), 163-168.
1 out of 5
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
 +13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.