CIVILICA We Respect the Science
(ناشر تخصصی کنفرانسهای کشور / شماره مجوز انتشارات از وزارت فرهنگ و ارشاد اسلامی: ۸۹۷۱)

Emerging Cyber Security Threats in the Era of the IoT

عنوان مقاله: Emerging Cyber Security Threats in the Era of the IoT
شناسه ملی مقاله: MECHCNF01_007
منتشر شده در اولین کنفرانس بین المللی پژوهش در برق، کامپیوتر و مکانیک در سال 1402
مشخصات نویسندگان مقاله:

Milad Davoodifar - Bachelor Student of Computer Engineering, Majoring in Artificial Intelligence, PolDokhtar Higher Education Institute, Lorestan University
Abolfazl Omidi - Bacelor Student of Computer Engineering, Majoring in Artificial Intelligence, PolDokhtar Higher Education Institute, Lorestan University
Amirreza Atarian - Bachelor Student of Computer Engineering, Majoring in Artificial Intelligence, PolDokhtar Higher Education Institute, Lorestan University

خلاصه مقاله:
The Internet of Things (IoT) has brought about a new era of automation and convenience, but it has also introduced new security challenges. Many IoT devices lack basic security measures, leaving them vulnerable to attacks. This paper explores the types of cybersecurity threats that exist in the context of IoT, detailing specific examples of attacks and exploits that have occurred. It also discusses the unique vulnerabilities associated with IoT devices and how they can be exploited by attackers. Finally, the paper offers mitigation strategies for organizations and individuals to help protect their IoT devices from cyber attacks. The paper identifies several types of cyber threats in the context of IoT, including malware, phishing, denial-of-service attacks, man-in-the-middle attacks, SQL injection, and cross-site scripting. The unique vulnerabilities associated with IoT devices are also discussed, such as weak authentication mechanisms, lack of encryption, and limited processing power. The paper offers several mitigation strategies, including securing passwords, implementing encryption, updating firmware, network segmentation, monitoring network traffic, and disabling unused features. By implementing these strategies, organizations and individuals can mitigate the risk of cyber-attacks on their IoT devices and ensure their security.

کلمات کلیدی:
Internet of Things (IoT), cybersecurity, threats, vulnerabilities, network traffic monitoring, device features

صفحه اختصاصی مقاله و دریافت فایل کامل: https://civilica.com/doc/1781008/