Baltezarević, Ivana and Baltezarević, Radoslav (2024) Threats to cybersecurity in the internet of things (IoT) era. In: 3. Bilsel International Kibyra Scientific Researches Congress. Astana publications, Burdu, pp. 503-511. ISBN 978-625-6125-24-7
Text
THREATS TO CYBERSECURITY IN THE INTERNET OF THINGS (IOT) ERA.pdf - Published Version Available under License Creative Commons Attribution Non-commercial No Derivatives. Download (725kB) |
Abstract
Devices that have sensors, processors, software, and other technologies that connect to other devices and systems over the internet or other communication networks to exchange data are referred to as Internet of Things, or IoT. With the use of IoT, machines can finish laborious tasks without assistance from humans. This technology has a huge impact on our daily lives by improving its functionality, convenience, and efficiency. They are changing not only how people use their homes and personal electronics but also how the healthcare, IoT manufacturing, and transportation sectors operate. However, one of the main issues is that a lot of IoT devices don't even have basic security protections. The acceleration in the use of IoT devices has drawn the attention of cybercriminals as well. These IoT attacks represent malicious attempts to exploit weaknesses in internet-connected devices, including medical, industrial, and smart home management systems. Attackers may take over the device, take advantage of confidential information, or utilize it to carry out other unlawful acts. The biggest businesses in this industry are aware of this issue and are making efforts to enhance privacy protection for IoT device users by encrypting data and putting strong access controls in place. The advancement of artificial intelligence (AI), which can identify dangers like malware and other harmful activity in real time, also holds enormous promise for enhancing IoT device security. Nevertheless, to guarantee cybersecurity, users themselves must also be vigilant and consistently take preventive measures by setting up data protection strategies.
Item Type: | Book Chapter |
---|---|
Uncontrolled Keywords: | Internet of Things (IoT), Cybersecurity, Cybercriminals |
Depositing User: | Ana Vukićević |
Date Deposited: | 20 Nov 2024 10:35 |
Last Modified: | 20 Nov 2024 10:35 |
URI: | http://repozitorijum.diplomacy.bg.ac.rs/id/eprint/1397 |
Actions (login required)
View Item |