INTERNET OF THINGS SECURITY FRAMEWORK

Authors

  • Dorin IORDACHE

DOI:

https://doi.org/10.53477/2668-2001-21-36

Keywords:

IoT; cybersecurity; Wi-Fi access point; network interface.

Abstract

It was unimaginable for a non-professional user that access data to personal e-mail, bank or identity accounts could be stolen via a mobile phone interface or connection, no more than twenty years ago. Nowadays, people with bad intentions – hacker – can use smart devices, such as: webcams, microwaves, refrigerators, door controllers, and others, generically we named it IoT[1], to access accounts like the ones mentioned above, without much effort. The Internet of Things is the place where devices are digitally interconnected, interacts with almost every domain. IoT development is closely correlated with growing of Internet. These issues have generated an unprecedented upward trend in Wi-Fi and IoT interconnecting networks. Cyber-security has gained new meanings because of the increasing number and scope of IoT devices. By developing these devices, especially among regular users, it is necessary to improve their security more than ever. How prepared are regular users and how can they protect themselves in the context of IoT penetration into their daily lives? it is a question that needs to be answered, in terms of the actions it can take immediately or in the  long run.

 

[1] IoT - Internet of Things

References

Ant, Allan. 2020. “Best Practices for Managing Passwords: Policies Must Balance Risk, Compliance and Usability Needs”, https://www.gartner.com/en/documents/1401917/best-practices-for-managing-passwords-policies-must-bala. Accessed December 10, 2020.

Weissberger, Alan. 2019. “Gartner: 5G IoT endpoints to triple between 2020 and 2021”; Surveillance cameras to be largest market over next 3 years, October 17, 2019, https://techblog.comsoc.org/2019/10/17/gartner-5g-iot-endpoints-to-triple-between-2020-and-2021-surveillance-cameras-to-be-largest-market-over-next-3-years/

EGHAM. 2019. “Analysts to Explore How IoT Will Accelerate Digital Transformation Initiatives at the Gartner IT Symposium/Xpo”, Gartner study 2019, November 3-7, 2019 Barcelona, Spain, https://www.gartner.com/en/newsroom/press-releases/2019-08-29-gartner-says-5-8-billion-enterprise-and-automotive-io

ISO. 2005. “ISO. Security techniques { code of practice for information security management”, 2005.

ISO/IEC 27001. “INFORMATION SECURITY MANAGEMENT”, https://www.iso.org/isoiec-27001-information-security.html

Kirk, Jeremi. 2020. “Heh' Botnet Targets Telnet on IoT Devices”, https://www.bankinfosecurity.com/heh-botnet-targets-telnet-on-iot-devices-a-15127. Accesed December 10, 2020

Mangat, Mona. 2020. “19 Cybersecurity Best Practices to Protect Your Business”, March 9, 2020, https://phoenixnap.com/blog/cybersecurity-best-practices. Accessed January 10, 2021.

OWASP. 2018. “Internet of Things Project OWASP” https://wiki.owasp.org/index.php/OWASP_ Internet_ of_Things_Project, 2018. Accessed May 10, 2020.

OWASP Top 10. 2018. “Top 10 Internet of Things OWASP”, https://owasp.org/www-pdf-archive/OWASP-IoT-Top-10-2018-final.pdf, 2018. Accessed March 10, 2020.

STATISTA. 2021. “Statista Research Department, Internet of Things (IoT) spending worldwide 2023”, Jan 14, 2021, https://www.statista.com/statistics/668996/worldwide-expenditures-for-the-internet-of-things/

Symantec, 2018. vol.23. “Symantec Internet Security Threat Report”. ISTR Vol. 23, 2018, Last access January 10,2021 https://docs.broadcom.com/doc/istr-23-2018-executive-summary-en-aa

Downloads

Published

2021-11-01