- Добавил: literator
- Дата: 17-07-2021, 16:38
- Комментариев: 0
Название: IoT Applications, Security Threats, and Countermeasures
Автор: Padmalaya Nayak, Niranjan Ray, P. Ravichandran
Издательство: CRC Press
Год: 2022
Страниц: 279
Язык: английский
Формат: pdf (true)
Размер: 17.3 MB
The massive growth of interconnected IoT devices poses an enormous range of cybersecurity challenges because of the globally pervasive influence of Internet technology and its increasing adoption in online communications and e-transactions. As IoT devices are being deployed in record numbers, the rise in their popularity comes with its fair share of potential challenges and security vulnerabilities. Owing to the enormous growth of IoT, hackers are eager to execute different types of attacks by exploiting the computational and communication capabilities of IoT devices. There are many types of cyberattacks such as denial-of-service (DoS), distributed denial-of-service (DDoS), password attacks, birthday attacks, phishing attacks, man in the middle attacks, and so on, which target the information-processing systems, computer networks, infrastructures or personal devices using various methods to steal, modify, and destroy the data.
Автор: Padmalaya Nayak, Niranjan Ray, P. Ravichandran
Издательство: CRC Press
Год: 2022
Страниц: 279
Язык: английский
Формат: pdf (true)
Размер: 17.3 MB
The massive growth of interconnected IoT devices poses an enormous range of cybersecurity challenges because of the globally pervasive influence of Internet technology and its increasing adoption in online communications and e-transactions. As IoT devices are being deployed in record numbers, the rise in their popularity comes with its fair share of potential challenges and security vulnerabilities. Owing to the enormous growth of IoT, hackers are eager to execute different types of attacks by exploiting the computational and communication capabilities of IoT devices. There are many types of cyberattacks such as denial-of-service (DoS), distributed denial-of-service (DDoS), password attacks, birthday attacks, phishing attacks, man in the middle attacks, and so on, which target the information-processing systems, computer networks, infrastructures or personal devices using various methods to steal, modify, and destroy the data.