INFORMATION SECURITY

Analysis of internet of things security breaches

  • 1 University for Library Studies and Information Technologies Sofia, Bulgaria

Abstract

The report analyzes the nature of the Internet of Things (IoT), presents a basic architectural model of IoT, and categorizes IoT according to various criteria. The most famous IoT security breaches are presented. The vulnerabilities that led to the security breaches and the scale and consequences of the impact of the breach are analyzed. Overview and analysis of IoT security breaches are the subject of this research. The main threats and vulnerabilities are systematize and the response of the world community is tracked

Keywords

References

  1. Tselkov, V., Sensor devices connected to the Internet - a big challenge for privacy and data protection, Information Bulletin of the Commission for Personal Data Protection, ISSN 2367-7759, issue 5 (56), September 2015
  2. Tselkov, V., Internet-based sensor systems and data protection, XIII National Scientific Conference with International Participation "Knowledge Society and Humanism of the XXI Century", October 31 - November 1, 2015, UniBIT, BAS
  3. Tselkov, V., Risk management for the security of communication and information systems, Academic publishing house "About letters - About letters", 2020, p. 128, ISBN 978-619- 185-445-5- pdf
  4. Tselkov, V, IoT, Security and Privacy, XII International Scientific Conference "TECH. TECHNOLOGIES. EDUCATION. SECURITY 2024”, SECURITY & FUTURE ISSUE 1/2024, ISSN: (PRINT) 2535-0668 ISSN: (ONLINE) 2535-082X, pp. 29-30
  5. Tselkov, V, Evaluation of the security of the Internet of Things, VVMU "N. I. Vaptsarov", Scientific Conference "NATIONAL SCIENTIFIC PROGRAM "SECURITY AND DEFENSE" - STATUS AND ACHIEVED RESULTS", November 5 and 6, 2024.
  6. Tselkov, V, Risk assessment model for the Internet of Things, , Collection of reports from the Annual University Scientific Conference - 2024, October 3 and 4, 2024, Volume 2, IC National Military University "Vasil Levski", ISSN 1314-1937, pp. 161=170
  7. Tselkov, V., S. Denchev and Ir. Peteva, Security of information resources, Academic publishing house "About letters - About letters", 2020, 268 pages, ISBN 978-619-185-432-5
  8. Scott R. Peppe, REGULATING THE INTERNET OF THINGS: FIRST STEPS TOWARDS MANAGING DISCRIMINATION, PRIVACY, SECURITY & CONSENT RICK SMOLAN & JENNIFER ERWITT, THE HUMAN FACE OF BIG DATA 3 (2012).
  9. https://www.hostduplex.com/blog/top-iot-device-vulnerabilities/#:~:text=IoT%20devices%20are%20vulnerable%20t o,both%20organizations%20and%20individual%20users.

Article full text

Download PDF