語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
FindBook
Google Book
Amazon
博客來
Weaponization of IoT Devices.
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Weaponization of IoT Devices./
作者:
Harssema, Erik Christopher.
面頁冊數:
1 online resource (51 pages)
附註:
Source: Masters Abstracts International, Volume: 82-05.
Contained By:
Masters Abstracts International82-05.
標題:
Information technology. -
電子資源:
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=28149039click for full text (PQDT)
ISBN:
9798678141095
Weaponization of IoT Devices.
Harssema, Erik Christopher.
Weaponization of IoT Devices.
- 1 online resource (51 pages)
Source: Masters Abstracts International, Volume: 82-05.
Thesis (M.S.)--Utica College, 2020.
Includes bibliographical references
The popularity and proliferation of the Internet of Things (IoT) has created a data rich environment of insecure connected devices and sensors. Growth of the IoT has far exceeded expectations and continues at a global rate of over 127 new device connections per second. This presents a landscape of endless opportunity for the development and advancement of cyber weapons. The purpose of this research was to examine the weaknesses in IoT security that could aid Intelligence Communities (ICs) in the weaponization of IoT devices, and security best practices users can follow to mitigate potential compromise. Findings revealed foundational weaknesses in IoT security stem from a combination of end user complacency and device manufacturers' value of speed to market and cost savings over privacy and security. These weaknesses have expanded the IoT attack surface and allowed for the development of classified tools by the IC for advanced surveillance, data collection and manipulation, and the ability to gain full control over IoT devices allowing for manipulation in both the physical and logical operating environments. The research concluded that these weaknesses can be mitigated by implementing foundational security best practices, enhancing the security and privacy of IoT device operation.
Electronic reproduction.
Ann Arbor, Mich. :
ProQuest,
2023
Mode of access: World Wide Web
ISBN: 9798678141095Subjects--Topical Terms:
532993
Information technology.
Subjects--Index Terms:
CybersecurityIndex Terms--Genre/Form:
542853
Electronic books.
Weaponization of IoT Devices.
LDR
:02955nmm a2200541K 4500
001
2365051
005
20231213130527.5
006
m o d
007
cr mn ---uuuuu
008
241011s2020 xx obm 000 0 eng d
020
$a
9798678141095
035
$a
(MiAaPQ)AAI28149039
035
$a
AAI28149039
040
$a
MiAaPQ
$b
eng
$c
MiAaPQ
$d
NTU
100
1
$a
Harssema, Erik Christopher.
$3
3705871
245
1 0
$a
Weaponization of IoT Devices.
264
0
$c
2020
300
$a
1 online resource (51 pages)
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
500
$a
Source: Masters Abstracts International, Volume: 82-05.
500
$a
Advisor: Pantani, Paul.
502
$a
Thesis (M.S.)--Utica College, 2020.
504
$a
Includes bibliographical references
520
$a
The popularity and proliferation of the Internet of Things (IoT) has created a data rich environment of insecure connected devices and sensors. Growth of the IoT has far exceeded expectations and continues at a global rate of over 127 new device connections per second. This presents a landscape of endless opportunity for the development and advancement of cyber weapons. The purpose of this research was to examine the weaknesses in IoT security that could aid Intelligence Communities (ICs) in the weaponization of IoT devices, and security best practices users can follow to mitigate potential compromise. Findings revealed foundational weaknesses in IoT security stem from a combination of end user complacency and device manufacturers' value of speed to market and cost savings over privacy and security. These weaknesses have expanded the IoT attack surface and allowed for the development of classified tools by the IC for advanced surveillance, data collection and manipulation, and the ability to gain full control over IoT devices allowing for manipulation in both the physical and logical operating environments. The research concluded that these weaknesses can be mitigated by implementing foundational security best practices, enhancing the security and privacy of IoT device operation.
533
$a
Electronic reproduction.
$b
Ann Arbor, Mich. :
$c
ProQuest,
$d
2023
538
$a
Mode of access: World Wide Web
650
4
$a
Information technology.
$3
532993
650
4
$a
Web studies.
$3
2122754
650
4
$a
Remote sensing.
$3
535394
650
4
$a
Computer science.
$3
523869
650
4
$a
Artificial intelligence.
$3
516317
653
$a
Cybersecurity
653
$a
Malware
653
$a
Vault7
653
$a
Internet of Things
653
$a
Weaponization
653
$a
Data rich environment
653
$a
Insecure devices
653
$a
Intelligence Communities
653
$a
User complacency
653
$a
IoT security
653
$a
Advanced surveillance
653
$a
Data manipulation
653
$a
Data collection
653
$a
Logical operating environments
655
7
$a
Electronic books.
$2
lcsh
$3
542853
690
$a
0489
690
$a
0984
690
$a
0646
690
$a
0800
690
$a
0501
690
$a
0799
710
2
$a
ProQuest Information and Learning Co.
$3
783688
710
2
$a
Utica College.
$b
Cybersecurity.
$3
2098218
773
0
$t
Masters Abstracts International
$g
82-05.
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=28149039
$z
click for full text (PQDT)
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9487407
電子資源
11.線上閱覽_V
電子書
EB
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入