IoT cybersecurity threats mitigation via integrated technical and non-technical solutions

被引:0
|
作者
Al-Sibai, Hazim S. [1 ]
Alrubaie, Theyab [1 ]
Elmedany, Wael M. [1 ]
机构
[1] Univ Bahrain, Coll Informat Technol, UOB Sakhir Campus,Zallaq Rd,Bldg S40,POB 32038, Zallaq, Bahrain
关键词
internet of things; IoT; cybersecurity; threats mitigation; industrial internet of things; IIoT; SECURITY CHALLENGES; INTERNET; THINGS; PRIVACY;
D O I
10.1504/ijesdf.2021.114957
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the growing number of connected devices to the internet every day, and the rapid development and deployment of internet of things (IoT), the number of security threats and vulnerabilities posed to these are also increased. Also, the use of IoT in the industry has become a major requirement for digitalisation transformation and high-priority business demand to increase productivity and profitability. The industrial internet of things (IIoT) is concerned with making industrial environments more connected and thus smarter. However, this transformation comes with a huge number of threats that should be addressed. The primary goal of this research paper is to provide a technical solution as well as a holistic approach (framework) of security concerns. This will be supported by a number of non-technical factors to build a resilient cybersecurity model to effectively and efficiently mitigate cybersecurity threats.
引用
收藏
页码:298 / 333
页数:36
相关论文
共 16 条
  • [1] An Integrated Model of Technical and Non-Technical Perspectives on Managing IoT Security
    Suryanegara, Muhammad
    Hayati, Nur
    PROCEEDINGS OF 9TH INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND MANAGEMENT (ICICM 2019), 2019, : 142 - 146
  • [2] On Cybersecurity Education for Non-technical Learners
    McNulty, Matthew
    Kettani, Houssain
    2020 3RD INTERNATIONAL CONFERENCE ON INFORMATION AND COMPUTER TECHNOLOGIES (ICICT 2020), 2020, : 413 - 416
  • [3] Cybersecurity Threats, Countermeasures and Mitigation Techniques on the IoT: Future Research Directions
    Altulaihan, Esra
    Almaiah, Mohammed Amin
    Aljughaiman, Ahmed
    ELECTRONICS, 2022, 11 (20)
  • [4] RFID privacy - A technical primer for the non-technical reader
    Juels, A
    PRIVACY AND TECHNOLOGIES OF IDENTITY: A CROSS-DISCIPLINARY CONVERSATION, 2006, : 57 - 73
  • [5] Crowdsourcing Analysis in 5G IoT: Cybersecurity Threats and Mitigation
    Ana Nieto
    Antonio Acien
    Gerardo Fernandez
    Mobile Networks and Applications, 2019, 24 : 881 - 889
  • [6] Crowdsourcing Analysis in 5G IoT: Cybersecurity Threats and Mitigation
    Nieto, Ana
    Acien, Antonio
    Fernandez, Gerardo
    MOBILE NETWORKS & APPLICATIONS, 2019, 24 (03): : 881 - 889
  • [7] A Comprehensive Technical Survey of Contemporary Cybersecurity Products and Solutions
    Tselios, Christos
    Tsolis, George
    Athanatos, Manos
    COMPUTER SECURITY: ESORICS 2019 INTERNATIONAL WORKSHOPS, IOSEC, MSTEC, AND FINSEC, 2020, 11981 : 3 - 18
  • [8] Non-Technical skills needed by cyber security graduates
    Hall, Joanne L.
    Rao, Asha
    PROCEEDINGS OF THE 2020 IEEE GLOBAL ENGINEERING EDUCATION CONFERENCE (EDUCON 2020), 2020, : 354 - 358
  • [9] Teaching Computer Engineering Concepts to Non-Technical Students
    Culic, Ioana
    Radovici, Alexandru
    Alexandru, Jan
    NEW TECHNOLOGIES AND REDESIGNING LEARNING SPACES, VOL I, 2019, : 249 - 254
  • [10] UAV-Assisted IoT Applications, Cybersecurity Threats, AI-Enabled Solutions, Open Challenges With Future Research Directions
    Adil, Muhammad
    Song, Houbing
    Mastorakis, Spyridon
    Abulkasim, Hussein
    Farouk, Ahmed
    Jin, Zhanpeng
    IEEE TRANSACTIONS ON INTELLIGENT VEHICLES, 2024, 9 (04): : 4583 - 4605