Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
The Internet of Things: Threats, Vul...
~
Gonzalez, Eric Y.
Linked to FindBook
Google Book
Amazon
博客來
The Internet of Things: Threats, Vulnerabilities, and Challenges to Incident Response and Computer Forensics.
Record Type:
Electronic resources : Monograph/item
Title/Author:
The Internet of Things: Threats, Vulnerabilities, and Challenges to Incident Response and Computer Forensics./
Author:
Gonzalez, Eric Y.
Published:
Ann Arbor : ProQuest Dissertations & Theses, : 2019,
Description:
75 p.
Notes:
Source: Masters Abstracts International, Volume: 80-11.
Contained By:
Masters Abstracts International80-11.
Subject:
Information Technology. -
Online resource:
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=13879128
ISBN:
9781392147290
The Internet of Things: Threats, Vulnerabilities, and Challenges to Incident Response and Computer Forensics.
Gonzalez, Eric Y.
The Internet of Things: Threats, Vulnerabilities, and Challenges to Incident Response and Computer Forensics.
- Ann Arbor : ProQuest Dissertations & Theses, 2019 - 75 p.
Source: Masters Abstracts International, Volume: 80-11.
Thesis (M.S.)--Utica College, 2019.
This item must not be added to any third party search indexes.
The Internet of Things (IoT) is the technology innovation of the century, and will forever impact how future generations communicate, work, and handle personal day-to-day tasks. IoT devices streamline processes and often automate everyday household tasks. Despite all the hype and added benefits to their uses, they continue to be the spotlight of recent breaches, privacy concerns, and security vulnerabilities and incidents. The purpose of this study is to shed light on the current threat landscape as it relates to the Internet of Things (IoT) while addressing the reasons why IoT devices are prime targets for attack. Additionally, the study examines the challenges of network defenders, incident responders, and forensic examiners face when investigating incidents.The study found IoT devices are plagued by many software and hardware vulnerabilities, most of which are examined and researched heavily by the Open Web Application Security Project (OWASP). Solutions include providing education to consumers on the risks and mitigations associated some of the more common vulnerabilities. Device manufacturers have a role to play in securing devices before they are released to the general market. Solutions to the challenges faced by Incident Responders and Computer Forensics examiners includes preparation before the incident or crime occurs. Proposed solutions include creating investigative and analytical procedures applying specifically to the Internet of Things, including understanding their internal makeup, where data is stored, and to whom data is transferred. Answering each of these questions provides potential sources of evidence used to paint an overall picture of the root cause of incidents and events.
ISBN: 9781392147290Subjects--Topical Terms:
1030799
Information Technology.
The Internet of Things: Threats, Vulnerabilities, and Challenges to Incident Response and Computer Forensics.
LDR
:02871nmm a2200337 4500
001
2209256
005
20191025102906.5
008
201008s2019 ||||||||||||||||| ||eng d
020
$a
9781392147290
035
$a
(MiAaPQ)AAI13879128
035
$a
(MiAaPQ)utica:11419
035
$a
AAI13879128
040
$a
MiAaPQ
$c
MiAaPQ
100
1
$a
Gonzalez, Eric Y.
$3
3436338
245
1 4
$a
The Internet of Things: Threats, Vulnerabilities, and Challenges to Incident Response and Computer Forensics.
260
1
$a
Ann Arbor :
$b
ProQuest Dissertations & Theses,
$c
2019
300
$a
75 p.
500
$a
Source: Masters Abstracts International, Volume: 80-11.
500
$a
Publisher info.: Dissertation/Thesis.
500
$a
Advisor: Sanchez, Michael R.
502
$a
Thesis (M.S.)--Utica College, 2019.
506
$a
This item must not be added to any third party search indexes.
506
$a
This item must not be sold to any third party vendors.
520
$a
The Internet of Things (IoT) is the technology innovation of the century, and will forever impact how future generations communicate, work, and handle personal day-to-day tasks. IoT devices streamline processes and often automate everyday household tasks. Despite all the hype and added benefits to their uses, they continue to be the spotlight of recent breaches, privacy concerns, and security vulnerabilities and incidents. The purpose of this study is to shed light on the current threat landscape as it relates to the Internet of Things (IoT) while addressing the reasons why IoT devices are prime targets for attack. Additionally, the study examines the challenges of network defenders, incident responders, and forensic examiners face when investigating incidents.The study found IoT devices are plagued by many software and hardware vulnerabilities, most of which are examined and researched heavily by the Open Web Application Security Project (OWASP). Solutions include providing education to consumers on the risks and mitigations associated some of the more common vulnerabilities. Device manufacturers have a role to play in securing devices before they are released to the general market. Solutions to the challenges faced by Incident Responders and Computer Forensics examiners includes preparation before the incident or crime occurs. Proposed solutions include creating investigative and analytical procedures applying specifically to the Internet of Things, including understanding their internal makeup, where data is stored, and to whom data is transferred. Answering each of these questions provides potential sources of evidence used to paint an overall picture of the root cause of incidents and events.
590
$a
School code: 1754.
650
4
$a
Information Technology.
$3
1030799
650
4
$a
Information science.
$3
554358
690
$a
0489
690
$a
0723
710
2
$a
Utica College.
$b
Cybersecurity.
$3
2098218
773
0
$t
Masters Abstracts International
$g
80-11.
790
$a
1754
791
$a
M.S.
792
$a
2019
793
$a
English
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=13879128
based on 0 review(s)
Location:
全部
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9385805
電子資源
11.線上閱覽_V
電子書
EB
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login