Categorizing threat types and cyber-assaults over Internet of Things-equipped gadgets

Abhinav Sharma, Anand Kumar Gupta, Mohammad Shabaz
{"title":"Categorizing threat types and cyber-assaults over Internet of Things-equipped gadgets","authors":"Abhinav Sharma, Anand Kumar Gupta, Mohammad Shabaz","doi":"10.1515/pjbr-2022-0100","DOIUrl":null,"url":null,"abstract":"Abstract Internet of Things (IoT) gadgets are very attractive globally, and IoT facilities are universal. Their progress has not been ignored, and the number of invaders and outbreaks on IoT and facilities is growing. Because cyber-assaults are zero-trust to the IoT, and the IoT is deeply ingrained in our lives and culture, we must embrace a comprehensive Zero-Trust strategy for cyber defense. As a result, the new model is no longer vulnerable to fear and outbreak on the IoT structure. In this article, an effort is made to categorize threat types and analyze and explain invaders and assaults on IoT gadgets and facilities.","PeriodicalId":90037,"journal":{"name":"Paladyn : journal of behavioral robotics","volume":"24 1","pages":"84 - 98"},"PeriodicalIF":0.0000,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Paladyn : journal of behavioral robotics","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1515/pjbr-2022-0100","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

Abstract

Abstract Internet of Things (IoT) gadgets are very attractive globally, and IoT facilities are universal. Their progress has not been ignored, and the number of invaders and outbreaks on IoT and facilities is growing. Because cyber-assaults are zero-trust to the IoT, and the IoT is deeply ingrained in our lives and culture, we must embrace a comprehensive Zero-Trust strategy for cyber defense. As a result, the new model is no longer vulnerable to fear and outbreak on the IoT structure. In this article, an effort is made to categorize threat types and analyze and explain invaders and assaults on IoT gadgets and facilities.
分类威胁类型和对物联网设备的网络攻击
物联网(IoT)设备在全球范围内都很有吸引力,物联网设施也很普遍。他们的进展并没有被忽视,物联网和设施上的入侵者和爆发的数量正在增加。由于网络攻击对物联网是零信任的,而物联网在我们的生活和文化中根深蒂固,我们必须采取全面的零信任网络防御战略。因此,新模式不再容易受到物联网结构上的恐惧和爆发的影响。在本文中,将努力对威胁类型进行分类,并分析和解释对物联网设备和设施的入侵者和攻击。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信