Cyber Security And Internet Of Things For this assignment, review the article: Abomhara, M., & Koien, G.M. (2015). Cyber security and the internet of

Cyber Security And Internet Of Things
For this assignment, review the article:
Abomhara, M., & Koien, G.M. (2015). Cyber security and the internet of things: Vulnerabilities, threats, intruders, and attacks. Journal of Cyber Security, 4, 65-88. Doi: 10.13052/jcsm2245-1439.414
and evaluate it in 3 pages (800 words), in APA format with in-text citation using your own words, by addressing the following:

What did the authors investigate, and in general how did they do so?
Identify the hypothesis or question being tested
Summarize the overall article.
Identify the conclusions of the authors
Indicate whether or not you think the data support their conclusions/hypothesis
Consider alternative explanations for the results
Provide any additional comments pertaining to other approaches to testing their hypothesis (logical follow-up studies to build on, confirm or refute the conclusions)
The relevance or importance of the study
The appropriateness of the experimental design

Don't use plagiarized sources. Get Your Custom Assignment on
Cyber Security And Internet Of Things For this assignment, review the article: Abomhara, M., & Koien, G.M. (2015). Cyber security and the internet of
From as Little as $13/Page

When you write your evaluation, be brief and concise, this is not meant to be an essay but an objective evaluation that one can read very easily and quickly. Also, you should include a complete reference (title, authors, journal, issue, pages) you turn in your evaluation. This is good practice for your literature review, which youll be completing during the dissertation process.

SafeAssign Originality Report
Fall 2020 – Emerging Threats & Countermeas (ITS-834-A01) – First Bi-T Week 4 Research Paper Submitted onThu, Sep 17, 2020, 9:03 PM

Sandeep Kumar Davuluri View Report Summary

View Originality Report – Old Design

INCLUDED SOURCES

Sources

Institutional database (2) %100

Student paper

Student paper

Top sources

Attachment1
Cybersecurity and Internet of th

%100

1

2

CYBER SECURITY 1

CYBER SECURITY

Sandeep Kumar Davuluri

University of the Cumberlands

The in the article Cyber Security and the Internet of Things: Vulnerabilities, Threats, Intruders and Attacks,”
the authors investigated types of threats and examined the different kinds of intruders in a computer
system (Abomhara & Koien,2015). Additionally, the authors look at what motivates intruders and the level
of impact caused by the attacks. Recently, computer security and architecture has gained more discussion
owing to the increasing number of cybercrimes. Computer systems have been a significant target for
cybercriminals who have different motives. To address computer security, cybersecurity experts must
understand cybercriminals in a multidimensional angle. Cybersecurity experts should know attackers
regarding who they are, their motives, and the potential threat they pose to computer systems.
Understanding the behaviors of cyber attackers is critical in neutralizing and preventing future attacks.

The use of the Internet makes use of computers and their systems vulnerable to cyber attackers.

There has been an increase in cyber-attacks targeting the internet of things. The chances of a severe
security breach might happen, and this can result in severe damages. The article tests the hypothesis of
cybersecurity internet of things devices. The article looks at the background information on the internet of
things. This includes the necessitating factors that expose the internet of things to attackers. The paper
identifies several issues that make the internet of things vulnerable to attackers. In the article, Iot devices
are more exposed to attacks because they mostly function unattended. This means they are vulnerable to
physical attacks. Additionally, Iot devices are exposed to eavesdropping and other attacks because they
communicate through wireless methods. Also, Iot devices lack complex processing capabilities. As a result,
they are not able to have comprehensive security architecture (Abomhara & Koien,2015). With the use of
sophisticated home devices, the chances of spying and hacking are high. These integrated systems will
create a loophole where other countries can spy, eg, the use of cameras, thermostats. Hacking can take
place and cause considerable damage to the community and state. The paper cites data confidentiality as a
significant concern in IoT. Also, privacy is a critical element in IoT. According to the authors, Trust ensures
that secure connections are established between hardware devices (Abomhara & Koien,2015). The article
argues that the identification of assessing in an Iot is essential in dealing with security threats. Assets in IoT
constitute of hardware and data contained in them. Therefore, identification of assets leads to the
formulation of a suitable security mechanism. Iot devices are vulnerable to attacks in two dimensions.
Attacks can utilize hardware or software vulnerabilities. Therefore, its essential to conduct vulnerability
tests regularly. One has to ensure that the use of integrated devices will not harm or tarnish an
organization’s reputation. There are critical measures to put in place to guarantee safety. Use stronger
credentials to install the devices, update the tools regularly, and install the security layer (Abomhara &
Koien,2015). The authors conclude that IOt devices are facing a more growing threat in terms of
cybercrimes. However, to achieve security of Iot devices, a wells designed framework identifies the
attackers, their motivations, and different types of attacks should be installed. Aso the paper state that
intelligence agencies and organized groups pose the greatest danger to Iot devises. Individual attackers are
considered to less severe as compared to group or intelligence agency attacks. The authors argue that
intelligence agencies and organized groups have huge resources and expertise to conduct more complex
attacks. On the other hand, individual attackers may not have substantial financial resources and expertise
required to conduct sophisticated attacks. However, all attackers are to be taken seriously because they
result in varying degrees of damages. The authors note that there is still much work needed in the security
of IoT devices. Currently, the standards implemented in IoT devices do not effectively address security
challenges. The authors argue that there is an end in the upgrade of standards that will cover the security
challenges and address future needs (Abomhara & Koien,2015). Data on the security of Iot supports
conclusions brought forward by the authors. The security of IoT devises a significant concern among many
people. The authors have present crucial information that reflects trends in Iot security. However, the
results can also be explained in the context of new technologies. IoT keeps on evolving, and there are
different significant vendors of Iot frameworks. As a result, there is a lack of harmonization in systems and
security standards. Therefore, it becomes difficult to establish a common standard that covers all the
significant weaknesses in systems.

1

1

2 1

There needs to be more reference to quantitative research data to test the hypothesis. This research

design utilizes qualitative instruments to come up with a conclusion. This research design is essential since
it offers depth in detail; it also provides an opportunity for further research. However, empirical data from
the quantitative analysis can be more accurate and reliable. This study is critical because it offers a
theoretical framework in understanding the security issue on IoT devices. There is an increase in the
number of cyber-attacks globally, hence the need to update security measures. This article explains the
crucial elements in enhancing the security of Iot devices. Additionally, researchers can use this article to

1

https://ucumberlands.blackboard.com/webapps/mdb-sa-BB5a31b16bb2c48/originalityReport/ultra?attemptId=fe905f91-deb1-4460-a81e-f595ad27b547&course_id=_130036_1&includeDeleted=true&print=true

https://ucumberlands.blackboard.com/webapps/mdb-sa-BB5a31b16bb2c48/originalityReport/ultra?attemptId=fe905f91-deb1-4460-a81e-f595ad27b547&course_id=_130036_1&includeDeleted=true&print=true&download=true

https://ucumberlands.blackboard.com/webapps/mdb-sa-BB5a31b16bb2c48/originalityReport?attemptId=fe905f91-deb1-4460-a81e-f595ad27b547&course_id=_130036_1&includeDeleted=true&force=true

build on other researches in areas of cybersecurity (Abomhara & Koien,2015).

References

Abomhara, M., & Koien, G. (2015). Cyber Security and the Internet of Things: Vulnerabilities,

Threats, Intruders and Attacks. Journal Of Cyber Security And Mobility, 4(1), 65-88.
https://doi.org/10.13052/jcsm2245-1439.414

1 1

Word Count: Submitted on: Submission UUID: Attachment UUID:

929 09/17/20 0fd05d28-0b6b-5d75-212e-8009e583531f eafdc7cd-2b78-742d-1585-241aed59d25a

Leave a Comment

Your email address will not be published. Required fields are marked *