For this assignment, review the article:Abomhara, M., & Koie…

For this assignment, review the article: Abomhara, M., & Koien, G.M. (2015). Cyber security and the internet of things: Vulnerabilities, threats, intruders, and attacks. , 65-88. Doi: 10.13052/jcsm2245-1439.414 and evaluate it in 3 pages (800 words), using your own words, by addressing the following: When you write your evaluation, be brief and concise, this is not meant to be an essay but an objective evaluation that one can read very easily and quickly. Also, you should include a complete reference (title, authors, journal, issue, pages) you turn in your evaluation. This is good practice for your literature review, which you’ll be completing during the dissertation process. Your paper should meet the following requirements: Purchase the answer to view it

Title: Cyber Security and the Internet of Things: Vulnerabilities, Threats, Intruders, and Attacks

Authors: Abomhara, M., & Koien, G.M.

Journal: Journal of Cyber Security and Mobility

Issue: Volume 4, Number 1

Pages: 65-88

In the article “Cyber Security and the Internet of Things: Vulnerabilities, Threats, Intruders, and Attacks,” Abomhara and Koien (2015) delve into the complex realm of cyber security within the context of the Internet of Things (IoT). This comprehensive study explores the various vulnerabilities, threats, intruders, and attacks that pose significant challenges in maintaining the security and privacy of IoT devices. The authors aim to critically analyze the current state of cyber security in the IoT landscape, identifying gaps and proposing potential solutions.

The authors begin by providing an overview of the IoT, highlighting its ubiquity and increasing integration into various aspects of our daily lives. They discuss the immense potential benefits of IoT technologies, ranging from smart homes and wearables to industrial automation and smart cities. However, they caution that these advancements come with inherent security risks due to the vast number of IoT devices and their interconnectedness.

Abomhara and Koien identify the main vulnerabilities present in the IoT infrastructure. They emphasize the lack of standardized security protocols, insufficient security measures in IoT devices, and the vulnerabilities arising from the dependence on cloud services and data storage. Additionally, they address the challenges associated with IoT device management, including firmware updates, patch management, and authentication procedures.

The authors highlight the diverse array of threats that exploit these vulnerabilities in the IoT ecosystem. They discuss the potential for unauthorized access, data breaches, eavesdropping, distributed denial of service (DDoS) attacks, and physical attacks on IoT devices. Notably, they emphasize the potential for cyber-physical attacks, where IoT devices are compromised to cause physical harm or damage.

Furthermore, Abomhara and Koien examine the different types of intruders who could exploit these vulnerabilities and carry out malicious activities within the IoT landscape. They categorize intruders into four main groups: external attackers, internal attackers, trusted insiders, and unintended users. The authors explain the motivations, tactics, and potential targets of each group, highlighting the need for robust defenses against such intruders.

In terms of attacks, the authors discuss the various techniques employed to exploit vulnerabilities and compromise the security of IoT devices. They explore common attack methods such as malware propagation, identity theft, device spoofing, and replay attacks. Moreover, they address the emerging threats of ransomware and botnets, which further complicate the security landscape.

Throughout the article, Abomhara and Koien present a comprehensive evaluation of the challenges and risks associated with cyber security in the IoT realm. They highlight the importance of proactive security measures, such as encryption, access control, intrusion detection systems, and continuous monitoring. The authors also emphasize the significance of a multidisciplinary approach, involving collaboration among different stakeholders, including manufacturers, service providers, policy makers, and end-users.

In conclusion, “Cyber Security and the Internet of Things: Vulnerabilities, Threats, Intruders, and Attacks” provides a valuable analysis of the current state of cyber security within the IoT landscape. Abomhara and Koien shed light on the vulnerabilities, threats, intruders, and attacks that pose significant challenges in securing IoT devices. This article serves as a valuable resource for researchers, practitioners, and policymakers working towards enhancing the security and privacy of IoT technologies.

References:

Abomhara, M., & Koien, G.M. (2015). Cyber security and the internet of things: Vulnerabilities, threats, intruders, and attacks. Journal of Cyber Security and Mobility, 4(1), 65-88.

Do you need us to help you on this or any other assignment?


Make an Order Now