Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Linked to FindBook
Google Book
Amazon
博客來
Weaponization of IoT Devices.
Record Type:
Electronic resources : Monograph/item
Title/Author:
Weaponization of IoT Devices./
Author:
Harssema, Erik Christopher.
Description:
1 online resource (51 pages)
Notes:
Source: Masters Abstracts International, Volume: 82-05.
Contained By:
Masters Abstracts International82-05.
Subject:
Information technology. -
Online resource:
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=28149039click for full text (PQDT)
ISBN:
9798678141095
Weaponization of IoT Devices.
Harssema, Erik Christopher.
Weaponization of IoT Devices.
- 1 online resource (51 pages)
Source: Masters Abstracts International, Volume: 82-05.
Thesis (M.S.)--Utica College, 2020.
Includes bibliographical references
The popularity and proliferation of the Internet of Things (IoT) has created a data rich environment of insecure connected devices and sensors. Growth of the IoT has far exceeded expectations and continues at a global rate of over 127 new device connections per second. This presents a landscape of endless opportunity for the development and advancement of cyber weapons. The purpose of this research was to examine the weaknesses in IoT security that could aid Intelligence Communities (ICs) in the weaponization of IoT devices, and security best practices users can follow to mitigate potential compromise. Findings revealed foundational weaknesses in IoT security stem from a combination of end user complacency and device manufacturers' value of speed to market and cost savings over privacy and security. These weaknesses have expanded the IoT attack surface and allowed for the development of classified tools by the IC for advanced surveillance, data collection and manipulation, and the ability to gain full control over IoT devices allowing for manipulation in both the physical and logical operating environments. The research concluded that these weaknesses can be mitigated by implementing foundational security best practices, enhancing the security and privacy of IoT device operation.
Electronic reproduction.
Ann Arbor, Mich. :
ProQuest,
2023
Mode of access: World Wide Web
ISBN: 9798678141095Subjects--Topical Terms:
532993
Information technology.
Subjects--Index Terms:
CybersecurityIndex Terms--Genre/Form:
542853
Electronic books.
Weaponization of IoT Devices.
LDR
:02955nmm a2200541K 4500
001
2365051
005
20231213130527.5
006
m o d
007
cr mn ---uuuuu
008
241011s2020 xx obm 000 0 eng d
020
$a
9798678141095
035
$a
(MiAaPQ)AAI28149039
035
$a
AAI28149039
040
$a
MiAaPQ
$b
eng
$c
MiAaPQ
$d
NTU
100
1
$a
Harssema, Erik Christopher.
$3
3705871
245
1 0
$a
Weaponization of IoT Devices.
264
0
$c
2020
300
$a
1 online resource (51 pages)
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
500
$a
Source: Masters Abstracts International, Volume: 82-05.
500
$a
Advisor: Pantani, Paul.
502
$a
Thesis (M.S.)--Utica College, 2020.
504
$a
Includes bibliographical references
520
$a
The popularity and proliferation of the Internet of Things (IoT) has created a data rich environment of insecure connected devices and sensors. Growth of the IoT has far exceeded expectations and continues at a global rate of over 127 new device connections per second. This presents a landscape of endless opportunity for the development and advancement of cyber weapons. The purpose of this research was to examine the weaknesses in IoT security that could aid Intelligence Communities (ICs) in the weaponization of IoT devices, and security best practices users can follow to mitigate potential compromise. Findings revealed foundational weaknesses in IoT security stem from a combination of end user complacency and device manufacturers' value of speed to market and cost savings over privacy and security. These weaknesses have expanded the IoT attack surface and allowed for the development of classified tools by the IC for advanced surveillance, data collection and manipulation, and the ability to gain full control over IoT devices allowing for manipulation in both the physical and logical operating environments. The research concluded that these weaknesses can be mitigated by implementing foundational security best practices, enhancing the security and privacy of IoT device operation.
533
$a
Electronic reproduction.
$b
Ann Arbor, Mich. :
$c
ProQuest,
$d
2023
538
$a
Mode of access: World Wide Web
650
4
$a
Information technology.
$3
532993
650
4
$a
Web studies.
$3
2122754
650
4
$a
Remote sensing.
$3
535394
650
4
$a
Computer science.
$3
523869
650
4
$a
Artificial intelligence.
$3
516317
653
$a
Cybersecurity
653
$a
Malware
653
$a
Vault7
653
$a
Internet of Things
653
$a
Weaponization
653
$a
Data rich environment
653
$a
Insecure devices
653
$a
Intelligence Communities
653
$a
User complacency
653
$a
IoT security
653
$a
Advanced surveillance
653
$a
Data manipulation
653
$a
Data collection
653
$a
Logical operating environments
655
7
$a
Electronic books.
$2
lcsh
$3
542853
690
$a
0489
690
$a
0984
690
$a
0646
690
$a
0800
690
$a
0501
690
$a
0799
710
2
$a
ProQuest Information and Learning Co.
$3
783688
710
2
$a
Utica College.
$b
Cybersecurity.
$3
2098218
773
0
$t
Masters Abstracts International
$g
82-05.
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=28149039
$z
click for full text (PQDT)
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9487407
電子資源
11.線上閱覽_V
電子書
EB
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login