Nothing Special   »   [go: up one dir, main page]

Wells, 2020 - Google Patents

Better practices for IoT smart home security

Wells, 2020

Document ID
3153037656463439112
Author
Wells J
Publication year

External Links

Snippet

Abstract Internet of Things (IoT) has become one of the fastest growing industries especially for smart home consumers. These devices are comprised of home appliances, automated devices, climate control, all which have the functionality of being controlled remotely from a …
Continue reading at search.proquest.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication

Similar Documents

Publication Publication Date Title
Shafiq et al. The Rise of “Internet of Things”: Review and Open Research Issues Related to Detection and Prevention of IoT‐Based Security Attacks
Rondon et al. Survey on enterprise Internet-of-Things systems (E-IoT): A security perspective
Upadhyay et al. SCADA (Supervisory Control and Data Acquisition) systems: Vulnerability assessment and security recommendations
Shah et al. A survey on Classification of Cyber-attacks on IoT and IIoT devices
Makhdoom et al. Anatomy of threats to the internet of things
Panchal et al. Security issues in IIoT: A comprehensive survey of attacks on IIoT and its countermeasures
Firdous et al. Modelling and evaluation of malicious attacks against the iot mqtt protocol
Cekerevac et al. Internet of things and the man-in-the-middle attacks–security and economic risks
US10630698B2 (en) Method and system for network access control based on traffic monitoring and vulnerability detection using process related information
Alcaraz et al. Critical control system protection in the 21st century
Hadar et al. A lightweight vulnerability mitigation framework for IoT devices
Scarfone et al. Sp 800-94. guide to intrusion detection and prevention systems (idps)
US10021070B2 (en) Method and apparatus for federated firewall security
Chauhan Practical Network Scanning: Capture network vulnerabilities using standard tools such as Nmap and Nessus
Varadharajan et al. Techniques for Enhancing Security in Industrial Control Systems
Miloslavskaya et al. Ensuring information security for internet of things
Mudgerikar et al. Iot attacks and malware
Wells Better practices for IoT smart home security
Baugher et al. Home-network threats and access controls
Gupta et al. Cyber threat analysis of consumer devices
Srivastava et al. Emerging technology IoT and OT: overview, security threats, attacks and countermeasures
Rakic-Skokovic Guidelines for Overcoming some IoT Security Issues
Burke Preventing DDOS attacks against IoT devices
Da Paz et al. A novel approach to resource starvation attacks on message queuing telemetry transport brokers
Tanya et al. A Comprehensive Study on Cybersecurity Challenges and Solutions in an IoT Framework