{"title":"Effects of Data Breaches on Internet of Things (IoT) Devices within the Proliferation of Daily-Life Integrated Devices","authors":"Rohith Vallabhaneni","doi":"10.47191/etj/v9i07.13","DOIUrl":null,"url":null,"abstract":"IoT has revolutionized life around us very quickly. All houses, offices, and even most of the cities in turn are a blanket or mosaic figured out by inter-woven devices keeping to each other; this shows how life was finally distracted. It is presented as a technological marvel that will make life simpler, more efficient, and connected more than it has ever been. However, beneath this gleaming surface lurks a growing threat: the widespread nature of vulnerabilities in IoT devices. The systematic review method is the basis of this study, using Google Scholar and keywords such as \"IoT security and consequences\", to retrieve scholarly articles pertaining between 2015 – 2023. Research articles that had strict inclusion criteria were considered to evaluate their applicability in the relationship between IoT security vulnerabilities and ordinary lives. These consequences include from information leakage to denial-of-service attacks and unauthorized access. The risks and scale differences from economic losses to life safety hazards that threaten public security due to an intensifying interdependency of IoT applications. The repercussions impact the key segments such as health care and military applications, where more stringent security measures can be highlighted.","PeriodicalId":507832,"journal":{"name":"Engineering and Technology Journal","volume":"47 18","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Engineering and Technology Journal","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.47191/etj/v9i07.13","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
IoT has revolutionized life around us very quickly. All houses, offices, and even most of the cities in turn are a blanket or mosaic figured out by inter-woven devices keeping to each other; this shows how life was finally distracted. It is presented as a technological marvel that will make life simpler, more efficient, and connected more than it has ever been. However, beneath this gleaming surface lurks a growing threat: the widespread nature of vulnerabilities in IoT devices. The systematic review method is the basis of this study, using Google Scholar and keywords such as "IoT security and consequences", to retrieve scholarly articles pertaining between 2015 – 2023. Research articles that had strict inclusion criteria were considered to evaluate their applicability in the relationship between IoT security vulnerabilities and ordinary lives. These consequences include from information leakage to denial-of-service attacks and unauthorized access. The risks and scale differences from economic losses to life safety hazards that threaten public security due to an intensifying interdependency of IoT applications. The repercussions impact the key segments such as health care and military applications, where more stringent security measures can be highlighted.