I Gede Adnyana, Emmy Febriani Thalib, Mariano Alan Harum, Martha Apriliani Chionia Nagas, Martinus Wilfrid Jawa
{"title":"讨论针对智能家居和连接设备的恶意软件攻击:调查日常生活中的网络安全风险","authors":"I Gede Adnyana, Emmy Febriani Thalib, Mariano Alan Harum, Martha Apriliani Chionia Nagas, Martinus Wilfrid Jawa","doi":"10.58982/jdlp.v3i1.507","DOIUrl":null,"url":null,"abstract":"Computer technology has advanced with the digital age. Software for several platforms is crucial to streamlining human work with computers. This software is essential for many user tasks, including IoT ones. Through data exploitation and communication technologies, the Internet of entities (IoT) connects physical and virtual entities to the global web. This technology aims to make it easier for humans to interact with objects and let them communicate. In daily life, numerous specialized gadgets use the Internet of Things (IoT), especially Smart Homes. Smart Homes integrate networked communication networks with home devices for remote control, monitoring, and access. The name \"Smart\" in Smart Homes suggests intelligence, however IoT devices have limitations. Malware is purposely designed to disrupt or gain unauthorized access to computer systems without the system owner's knowledge or agreement. Malware threatens smart home security widely. Malware can also quickly regenerate and adapt as technology advances. It's often integrated into popular online apps. This study examines how malware assaults affect IoT and Smart Home devices. The study's conclusions include an analytical report on IoT and Smart Home malware mitigation in legal perspectives.","PeriodicalId":481563,"journal":{"name":"Journal of Digital Law and Policy","volume":"161 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A Discussion of Malware Attacks Targeting Smart Homes and Connected Devices: Investigating Cybersecurity Risks in Everyday Living\",\"authors\":\"I Gede Adnyana, Emmy Febriani Thalib, Mariano Alan Harum, Martha Apriliani Chionia Nagas, Martinus Wilfrid Jawa\",\"doi\":\"10.58982/jdlp.v3i1.507\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Computer technology has advanced with the digital age. Software for several platforms is crucial to streamlining human work with computers. This software is essential for many user tasks, including IoT ones. Through data exploitation and communication technologies, the Internet of entities (IoT) connects physical and virtual entities to the global web. This technology aims to make it easier for humans to interact with objects and let them communicate. In daily life, numerous specialized gadgets use the Internet of Things (IoT), especially Smart Homes. Smart Homes integrate networked communication networks with home devices for remote control, monitoring, and access. The name \\\"Smart\\\" in Smart Homes suggests intelligence, however IoT devices have limitations. Malware is purposely designed to disrupt or gain unauthorized access to computer systems without the system owner's knowledge or agreement. Malware threatens smart home security widely. Malware can also quickly regenerate and adapt as technology advances. It's often integrated into popular online apps. This study examines how malware assaults affect IoT and Smart Home devices. The study's conclusions include an analytical report on IoT and Smart Home malware mitigation in legal perspectives.\",\"PeriodicalId\":481563,\"journal\":{\"name\":\"Journal of Digital Law and Policy\",\"volume\":\"161 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-09-30\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Journal of Digital Law and Policy\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.58982/jdlp.v3i1.507\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Digital Law and Policy","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.58982/jdlp.v3i1.507","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Discussion of Malware Attacks Targeting Smart Homes and Connected Devices: Investigating Cybersecurity Risks in Everyday Living
Computer technology has advanced with the digital age. Software for several platforms is crucial to streamlining human work with computers. This software is essential for many user tasks, including IoT ones. Through data exploitation and communication technologies, the Internet of entities (IoT) connects physical and virtual entities to the global web. This technology aims to make it easier for humans to interact with objects and let them communicate. In daily life, numerous specialized gadgets use the Internet of Things (IoT), especially Smart Homes. Smart Homes integrate networked communication networks with home devices for remote control, monitoring, and access. The name "Smart" in Smart Homes suggests intelligence, however IoT devices have limitations. Malware is purposely designed to disrupt or gain unauthorized access to computer systems without the system owner's knowledge or agreement. Malware threatens smart home security widely. Malware can also quickly regenerate and adapt as technology advances. It's often integrated into popular online apps. This study examines how malware assaults affect IoT and Smart Home devices. The study's conclusions include an analytical report on IoT and Smart Home malware mitigation in legal perspectives.