Abhinav Sharma, Anand Kumar Gupta, Mohammad Shabaz
{"title":"Categorizing threat types and cyber-assaults over Internet of Things-equipped gadgets","authors":"Abhinav Sharma, Anand Kumar Gupta, Mohammad Shabaz","doi":"10.1515/pjbr-2022-0100","DOIUrl":null,"url":null,"abstract":"Abstract Internet of Things (IoT) gadgets are very attractive globally, and IoT facilities are universal. Their progress has not been ignored, and the number of invaders and outbreaks on IoT and facilities is growing. Because cyber-assaults are zero-trust to the IoT, and the IoT is deeply ingrained in our lives and culture, we must embrace a comprehensive Zero-Trust strategy for cyber defense. As a result, the new model is no longer vulnerable to fear and outbreak on the IoT structure. In this article, an effort is made to categorize threat types and analyze and explain invaders and assaults on IoT gadgets and facilities.","PeriodicalId":90037,"journal":{"name":"Paladyn : journal of behavioral robotics","volume":"24 1","pages":"84 - 98"},"PeriodicalIF":0.0000,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Paladyn : journal of behavioral robotics","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1515/pjbr-2022-0100","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
Abstract Internet of Things (IoT) gadgets are very attractive globally, and IoT facilities are universal. Their progress has not been ignored, and the number of invaders and outbreaks on IoT and facilities is growing. Because cyber-assaults are zero-trust to the IoT, and the IoT is deeply ingrained in our lives and culture, we must embrace a comprehensive Zero-Trust strategy for cyber defense. As a result, the new model is no longer vulnerable to fear and outbreak on the IoT structure. In this article, an effort is made to categorize threat types and analyze and explain invaders and assaults on IoT gadgets and facilities.