Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Overcoming Security Vulnerabilities and Cyberattacks in IoT Environment
1. Cyber Conference 2019
A PRESENTATION ON:
OVERCOMING SECURITY
VULNERABILITIES AND
CYBERATTACKS IN IOT
ENVIRONMENT
By: Farah Syazwani Binti Baharuddin (2016652704)
13th June 2019
2. INTRODUCTION
The Internet of Things (IoT) as a spring up
technology with noteworthy potential of
development in this decade
Sulkamo (2018), disclosed IoT to be a part of the
Internet of the future, where billions of intelligent
“things” will communicate to cater to human services
and needs.
As much as how IoT opens doors to variety of
opportunities, it also brings along its threats such as
cyberattacks.
Cyber Conference 2019
4. PROTECTION
Cyber Conference 2019
AGAINST THREATS
SECURING
TRANSPORT LAYER
VULNERABILITIES:
use secured
communication
protocols; TLS or
SSH
PROTECTING
AGAINST THE
COMPROMISING
ACCOUNT:
i. use lock out
timer in case of
failed login
attempts
ii. set password
policy as desired
OLD APPLIANCES:
implement an
automated updating
process
1
2
3
5. CONCLUSION
Gartner (2017) estimates that the number of connected IoT
devices could be 20 billion or more in year 2020.
All in all, IoT environments should be served as any other
ICT or computer devices.
The protection of IoT appliances is as critical as any other
computer system connected to the internet. Because by
protection, the device itself is not the only thing but is
protecting the other user on the internet as well
Cyber Conference 2019