Cyber Security and the Internet of Things: Vulnerabilities, Threats, Intruders and Attacks

Author(s): Mohamed Abomhara and Geir M. Køien  |  Published date:  Nov, 2011

<p style="text-align:justify;"><span style="font-size:medium;color:#3300ff;"><strong>Abstract </strong></span></p><p style="text-align:justify;">Internet of Things (IoT) devices are rapidly becoming ubiquitous while IoT services are becoming pervasive. Their success has not gone unnoticed and the number of threats and attacks against IoT devices and services are on the increase as well. Cyber-attacks are not new to IoT, but as IoT will be deeply interwoven in our lives and societies, it is becoming necessary to step up and take cyber defense seriously. Hence, there is a real need to secure IoT, which has consequently resulted in a need to comprehensively understand the threats and attacks on IoT infrastructure. This paper is an attempt to classify threat types, besides analyze and characterize intruders and attacks facing IoT devices and services. </p><p style="text-align:justify;"><strong>Keywords:</strong> Internet of Things, Cyber-attack, Security threats.</p><p style="text-align:justify;"><span style="color:#3300ff;font-size:medium;"><strong>1 Introduction </strong></span></p><p style="text-align:justify;">The recent rapid development of the Internet of Things (IoT) [1, 2] and its ability to offer different types of services have made it the fastest growing technology, with huge impact on social life and business environments. IoT has</p>

Download pdf

A Recent Study over Cyber Security and its Elements

Author(s): Jitendra Jain and Dr. Parashu Ram Pal  |  Published date:  Nov, 2011

<div style="text-align:justify;"><p><span style="color:#3300ff;font-size:small;"><strong>Abstract: </strong></span></p><p>Computer security or Cyber Security is combination of processes, technologies and practices. The objective of cyber Security is to protect programs, application, networks, computers and data from attack. In a computing context, security includes both cyber security and physical security. The attacker damage or theft software or information well as from disruption or misdirection of the services they misguide. Cyber security includes controlling physical access of the hardware, application, networks and protecting against harm that may come via networks. In this paper we proposed study of Cyber Security and its elements. We also give various security aspects related with cyber security. </p><p><strong>Keywords:</strong> Cyber Security, Parameters of Cyber Security and Security Attacks. </p><p><span style="color:#3300ff;font-size:small;"><strong>I. INTRODUCTION</strong></span> Cyber security is the combination of policies and practices to prevent and monitor computers, networks, programs and data from unauthorized access or attacks that are aimed for exploitation[1] The major areas which are included in cyber securities are as follows:</p></div>

Download pdf