INTRODUCTION
The Internet of things (IoT) is a system of interrelated computing devices, mechanical and digital machines, or objects that are provided with unique identifiers (UIDs) and the ability to transfer data over a network without requiring human-to-human or human-to-computer interaction. The IoT allows physical objects to be monitored and controlled remotely. Things can be anything from cars to factories to smart homes. IoT devices are usually connected to the Internet, allowing them to send and receive data. This data can be used to monitor and control the devices, or it can be used for other purposes.
This paper will assess and review IoT cyber security attacks and mitigation techniques. IoT devices are increasingly becoming targets of cyber attacks. In 2015, the number of IoT devices was estimated to be around 54 billion, which is expected to grow exponentially in the coming years . Cybersecurity attacks against IoT devices have been reported worldwide, including in the United States, China, Russia, and Europe. Cyber security is protecting computer systems from unauthorized access or theft of data. Cyber security concerning IoT generally refers to protecting devices and networks connected to the Internet. This can include everything from ensuring that data is appropriately encrypted and stored to monitoring for unauthorized activity and responding quickly in the event of an attack.
Cyber-attacks in the IoT space can have several consequences. They can expose users’ personal information, damage or disable equipment, and potentially even lead to loss of life. To protect themselves against these threats, users need to be aware of the risks posed by cyber-attacks in the IoT space and understand how to mitigate them. Users also need to be mindful of the dangers posed by IoT devices. For example, not all devices are adequately secured and can be exploited by malicious actors. In addition, many users may not have the knowledge or experience to protect themselves from cyber-attacks in the IoT space. While mitigation techniques are essential, users must also be aware of the risks posed by cyber-attacks in the IoT space and take steps to protect themselves.
PROBLEM STATEMENT
Internet of Things (IoT) devices are becoming increasingly prevalent in our everyday lives. They are used in various settings, from homes and offices to factories and hospitals. However, as these devices become more widespread, so do the associated risks. For example, many high-profile cyber-security incidents have occurred in the IoT space. In 2013, reported cyber-attacks reached 1.5 million, a 200% increase from 2012. In March of 2022, for example, security researchers discovered a vulnerability in smart home devices that could be used to allow unauthorized access to users’ homes. Furthermore, in October 2021, hackers were able to take control of millions of vehicles using cyber-security vulnerabilities in their software.
OBJECTIVES OF THE STUDY
GENERAL OBJECTIVES
Identify the types of attacks that IoT devices face.
Identify mitigating techniques for these types of attacks.
SPECIFIC OBJECTIVES
Identify the different layers in an IoT system.
Identify the vulnerabilities in each layer of an IoT system.
Determine the best method to patch these vulnerabilities.
RESEARCH QUESTIONS
How is an IoT device vulnerable to an attack by malicious actors?
How can we prevent these kinds of attacks?
How can we make IoT safer?
Last Completed Projects
topic title | academic level | Writer | delivered |
---|