Site icon Eminence Papers

Cyber Security and The Internet of Things

Cyber Security and The Internet of Things

The publication by Abomhara and Køien (2015), is about cyber-attacks on the internet of things (IoT) platform. It explains that due to the advancements in IoT, cyber-attacks have been on the increase. Consequently, it is important for cybersecurity experts to implement strong cyber defence on IoT. However, to implement effective cyber defence, experts have to understand the possible threats and attacks in IoT. In their discussion, Abomhara and Køien (2015) state that device vulnerabilities are the targets for exploitation by cyber attackers. The most popular attacks are denial of service and virus infestation. To counter these cyber-attacks, experts have to understand the motives of the attackers (Abomhara & Køien, 2015). It is also important to identify the capabilities of the attackers. Actions proposed in solving cyber-attacks include policy implementation as well as strong procedures (Abomhara & Køien, 2015). Therefore, before making conclusions, Abomhara and Køien (2015), identified the devices used in IoT and the services available. They also stated the possible vulnerabilities, threats, and attacks. Afterwards, they stated the primary security and privacy goals. Another important aspect described by Abomhara and Køien (2015) was that of intruders’ motivations and capabilities. The motivations and capabilities would facilitate the identification and implementation of cyber defence.

Abomhara and Køien (2015) concluded that several cyber threats should be identified before planning a course of action. Therefore, their study introduced IoT threats and challenges. The threats identified were those of device vulnerabilities. Smart devices were found to have vulnerabilities that would be exploited by attackers, and the most likely attack was the denial of service attack (Abomhara & Køien, 2015). For example, certain commands could be executed on the IoT devices to launch the denial of service attack. After identifying threats, they would be documented, stating the best course of action and implementation (Abomhara & Køien, 2015). Attackers were classified into individuals and organized groups. It was noted that countering individual attackers was easier than tackling organized criminal groups. This is because organized criminal groups could have more resources and spontaneity as compared to an individual attacker (Abomhara & Køien, 2015). To solve cyber-attacks, patterns of attacks should be observed, and it is easier to master the pattern of an individual attacker. Attackers also study patterns in IoT to find a vulnerable point for exploitation (Abomhara & Køien, 2015). This could be obtained through data mining.

Based on research, denial-of-service attacks are common in IoT (Imdad et al., 2020). This type of attack is launched as a result of device vulnerability. The device has to be powered and active within IoT (Imdad et al., 2020). This finding is similar to the one observed by Abomhara and Køien (2015). Attackers find the device on IoT and study the patterns of use. This allows them to plan an attack. Therefore, it would be correct to state that in IoT, there is a high probability of a DOS attack. Consequently, it should be considered during IoT risk mitigation. The other IoT security risk observed by Abomhara and Køien (2015) is that of virus manifestation on the devices within the IoT. This risk was also observed in research by Opara and Mahfouz (2016), where malware was used to implement a cyber-attack. The malware was Stuxnet Worm, which was aimed at capturing and controlling systems without the knowledge of the respective system operators. Both of the above attacks require that cyber security experts keep monitoring the IoT and mitigating risks. To avoid cyber-attacks, security experts would also be required to identify possible attackers, their motives, and their capabilities.

There are several security risk factors in IoT, not just DOS and virus manifestation (Imdad et al., 2020). Some of the risks include IP spoofing, authentication, and man-in-the-middle attack. Abomhara and Køien (2015) only described two security risks. Therefore, their study was not exhaustive. More findings could have been made. The research by Abomhara and Køien (2015) could be considered shallow, and more research could be done. However, the two risks evaluated by Abomhara and Køien (2015) were expounded extensively. There was enough information on what the possible attacks were and how to counter them.

In conclusion, Abomhara and Køien (2015) explained what IoT was, the devices involved, and the services accessed. They also stated that because of the growth in the use of IoT, there have been increased cyber-attacks. The two described possible risks in IoT and how to solve them. The data used to describe how to curb IOT risks by Abomhara and Køien (2015) was sufficient because it illustrated how the attacks happened and how they were dealt with. This information can be used as a reference by other cybersecurity experts. However, based on IoT security risks research by other authors, Abomhara and Køien (2015) did not state all the possible IoT attacks. This means that they also did not discuss all the possible measures for curbing cyber-attacks in IoT.

References

Abomhara, M., & Køien, G. M. (2015). Cyber Security and the Internet of Things: Vulnerabilities, Threats, Intruders and Attacks. Journal of Cyber Security4, 65–88. Doi: 10.13052/jcsm2245-1439.414

Imdad, M., Jacob, D. W., Mahdin, H., Baharum, Z., Shaharudin, S. M., & Azmi, M. S. (2020). Internet of things: security requirements, attacks and countermeasures. Indonesian Journal of Electrical Engineering and Computer Science18(3), 1520 – 1530. https://www.researchgate.net/publication/341795644_Internet_of_things_security_requirements_attacks_and_counter_measures

Opara, E. U., & Mahfouz, A. Y. (2016). Conquering the Cyber Attacks: Analysis and Protecting the Enterprise Resources. International Journal of Business Continuity and Risk Management6(4), 1-18. https://www.researchgate.net/publication/311938996_Conquering_the_cyber_attacks_analysis_and_protecting_the_enterprise_resources

ORDER A PLAGIARISM-FREE PAPER HERE

We’ll write everything from scratch

Question 


Review the article:
Abomhara, M., & Koien, G.M. (2015). Cyber security and the internet of things: Vulnerabilities, threats, intruders, and attacks. Journal of Cyber Security, 4, 65-88. Doi: 10.13052/jcsm2245-1439.414

And evaluate it in 3 pages (800 words), using your own words, by addressing the following:
What did the authors investigate, and in general, how did they do so?
Identify the hypothesis or question being tested.

Cyber Security and The Internet of Things

Summarize the overall article.
Identify the conclusions of the authors.
Indicate whether or not you think the data supports their conclusions/hypothesis.
Consider alternative explanations for the results.

Provide any additional comments pertaining to other approaches to testing their hypothesis (logical follow-up studies to build on, confirm or refute the conclusions)
The relevance or importance of the study
The appropriateness of the experimental design

When you write your evaluation, be brief and concise. This is not meant to be an essay but an objective evaluation that one can read very easily and quickly. Also, you should include a complete reference (title, authors, journal, issue, pages) when you turn in your evaluation. This is good practice for your literature review, which you’ll be completing during the dissertation process.

Your paper should meet the following requirements:
Be approximately three pages in length, not including the required cover page and reference page. (Remember, APA is double spaced)
Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
Be clear and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Exit mobile version