Running head: CYBERSECURITY AND THE INTERNET OF THINGS: VULNERABILITIES, THREATS, INTRUDERS, AND ATTACKS 1
CYBERSECURITY AND THE INTERNET OF THINGS: VULNERABILITIES, THREATS, INTRUDERS, AND ATTACKS 5
CYBERSECURITY AND THE INTERNET OF THINGS: VULNERABILITIES, THREATS, INTRUDERS, AND ATTACKS
Name:
University
Date: 09/16/2020
Cybersecurity and the Internet of Things: Vulnerabilities, Threats, Intruders, and Attacks
This research article talks about cybersecurity and the internet of things that are increasingly becoming universal. Mohamed Abomhara and Geir M. Køien wrote the article. The writers were instigating the success of IoT services and the threats and attacks against them, increasing at an alarming rate. It needs to secure the internet of things, which has resulted in the need to understand the threats on the internet of things infrastructure. This paper aims at finding out the different types of threats, investigate and characterize the threats, attacks, and intruders affecting IoT devices and services.
One way to ensure the security of IoT services is to maintain the highest intrinsic value of the intangible and tangible object. This paper looks to add to a superior comprehension of dangers and their traits beginning from different interlopers like associations and insight. The way toward distinguishing dangers to frameworks and framework weaknesses is vital for indicating a vigorous, complete security prerequisites arrangement and decides whether the security arrangement is secure against noxious assaults. Clients, governments, and IoT designers should eventually comprehend the dangers and answer several questions, including the assets, principal entities, threats, capability, and resource levels. The threats that can affect specific assets and the current design are put in place to protect against the threats.
The growth of internet has resulted in significant risks both to users' security and privacy. Most of the risks are a result of vulnerabilities of devices that arise from cybercrime caused by hackers and the inappropriate use of system resources. What consumers need is confidence to enable them to embrace the internet of things to benefit frontend the risks of cybersecurity fully. Most of the IoT cybersecurity to be exposed to several threats such as viruses’ attacks. Most consumers make a mistake to think that following simple steps to avoid the threats ominous tackling the system vulnerabilities is enough. What they need to do is to have an understanding of system assets, figure out the different vulnerabilities and the threats that exist. Besides, it is a good idea to determine the system assets and the assets that need to be protected against. The leading IoT assets include data and information, software, hardware, and assets that focus on services. The research shows it is vital to understand the threats in detail to develop a better system mitigation system. When individuals understand the potential attacks, it becomes easier for them developers to figure out when they need to invest more and find the best solutions to the threats on the system. Intruders can be grouped into three main types: personal attacks, organized attacks, and intelligence agencies. Every type of attacker has exceptional skill levels, motivation, source of funding, and risk tolerance. Individuals need to study the different types of attackers and determine the system they are going to attack. (Abomhara and K�ien, 2015) This will help them understand all the threats and figure out how they can weaken the systems.
The researchers concluded that much work needs to be done in the field of the internet of things and cybersecurity by collaborating with both vendors and consumers. Therefore, new standards need to be put in place to provide solutions to the shortcoming of the security mechanisms put in place for current IoT. Besides, the security strategies for access control, identity management, and authentication need to be considered in the early stages of product development.
The data support their conclusions since challenges and threats to IoT were discussed in this paper. The paper's main aim was to identify the assets and potential threats, attacks, and vulnerabilities that IoT is facing. Besides, an overview of the vital IoT security issues addressed, with a significant focus on security challenges facing the internet of things devices and services. The article also showed that if we would like to secure IoT devices and services, it is best to address privacy and security challenges. The research also majored on the cyber threats that consist of actors, capability, and motivation that are escalated by cyberspace's specific features.
This study is essential as it helps people researching the security industry by assisting them in identifying the main issues affecting IoT security and making it easier for them to understand the threats from several intruders such as intelligence agencies and organizations.
The design used by the researchers is very appropriate. In the research paper, we are introduced to the internet of things and its rapid development and taken through its impact on users' social and business lives. Furthermore, we get a breakdown of the risks that IoT faces and the solutions that can be put in a place to curb the threats.
References
Abomhara, M., and K�ien, G., 2015. Cyber Security and the Internet of Things: Vulnerabilities, Threats, Intruders, and Attacks. Journal of Cyber Security and Mobility, 4(1), pp.65-88.
Meneghello, F., Calore, M., Zucchetto, D., Polese, M., & Zanella, A. (2019). IoT: Internet of Threats? A Survey of Practical Security Vulnerabilities in Real IoT Devices. IEEE Internet Of Things Journal, 6(5), 8182-8201. DOI: 10.1109/jiot.2019.2935189

Get help from top-rated tutors in any subject.
Efficiently complete your homework and academic assignments by getting help from the experts at homeworkarchive.com