Categorizing threat types and cyber-assaults over Internet of Things-equipped gadgets

Abhinav Sharma, Anand Kumar Gupta, Mohammad Shabaz
{"title":"Categorizing threat types and cyber-assaults over Internet of Things-equipped gadgets","authors":"Abhinav Sharma, Anand Kumar Gupta, Mohammad Shabaz","doi":"10.1515/pjbr-2022-0100","DOIUrl":null,"url":null,"abstract":"Abstract Internet of Things (IoT) gadgets are very attractive globally, and IoT facilities are universal. Their progress has not been ignored, and the number of invaders and outbreaks on IoT and facilities is growing. Because cyber-assaults are zero-trust to the IoT, and the IoT is deeply ingrained in our lives and culture, we must embrace a comprehensive Zero-Trust strategy for cyber defense. As a result, the new model is no longer vulnerable to fear and outbreak on the IoT structure. In this article, an effort is made to categorize threat types and analyze and explain invaders and assaults on IoT gadgets and facilities.","PeriodicalId":90037,"journal":{"name":"Paladyn : journal of behavioral robotics","volume":"24 1","pages":"84 - 98"},"PeriodicalIF":0.0000,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Paladyn : journal of behavioral robotics","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1515/pjbr-2022-0100","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

Abstract

Abstract Internet of Things (IoT) gadgets are very attractive globally, and IoT facilities are universal. Their progress has not been ignored, and the number of invaders and outbreaks on IoT and facilities is growing. Because cyber-assaults are zero-trust to the IoT, and the IoT is deeply ingrained in our lives and culture, we must embrace a comprehensive Zero-Trust strategy for cyber defense. As a result, the new model is no longer vulnerable to fear and outbreak on the IoT structure. In this article, an effort is made to categorize threat types and analyze and explain invaders and assaults on IoT gadgets and facilities.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
分类威胁类型和对物联网设备的网络攻击
物联网(IoT)设备在全球范围内都很有吸引力,物联网设施也很普遍。他们的进展并没有被忽视,物联网和设施上的入侵者和爆发的数量正在增加。由于网络攻击对物联网是零信任的,而物联网在我们的生活和文化中根深蒂固,我们必须采取全面的零信任网络防御战略。因此,新模式不再容易受到物联网结构上的恐惧和爆发的影响。在本文中,将努力对威胁类型进行分类,并分析和解释对物联网设备和设施的入侵者和攻击。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Robot-assisted therapy for upper limb impairments in cerebral palsy: A scoping review and suggestions for future research Discrimination against robots: Discussing the ethics of social interactions and who is harmed Power quality enhancement of solar–wind grid connected system employing genetic-based ANFIS controller Control optimization of taper interference coupling system for large piston compressor in the smart industries Ultra-low latency communication technology for Augmented Reality application in mobile periphery computing
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1