TITLE

Is it possible to make the internet-of-things secure?

AUTHOR(S)
Bush, Steve
PUB. DATE
February 2014
SOURCE
Electronics Weekly;2/19/2014, Issue 2577, p12
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article analyzes the security concerns associated with Internet-of-things (IoT) under the Internet protocol version 6 (IPv6). It is reported that, although the IoT has enabled people to do things like creating ad-hoc home automation on their phones, it has also created security concerns like suggestions on the nearest house in an area which is empty which can then be used by thieves. It is reported that, to tackle this security problem it is necessary that the running machine is secure.
ACCESSION #
94778454

 

Related Articles

  • Key Trends in Information Security for 2015. Papineni, Ramsunder // Dataquest;12/31/2014, Vol. 32/33 Issue 24/1, p58 

    The article focuse son the important trends in the information security in 2015. Smart phones that hold data are of interest to hackers. Cyber insurance is to become an important part of cyber strategies with businesses seeking to marginalize the costs of a breach. The Cryptolocker malware is...

  • Novel Approach for Control Data Theft Attack in Cloud Computing. Sastry, K. Narasimha; Rao, B. Thirumala; Gunasekhar, T. // International Journal of Electrical & Computer Engineering (2088;Dec2015, Vol. 5 Issue 6, p1545 

    Information security is a major problem faced by cloud computing around the world. Because of their adverse effects on organizational information systems, viruses, hackers, and attackers insiders can jeopardize organizations capabilities to pursue their undertaken effectively. Although...

  • Cyber threats: How serious? Van Slambrouck, Paul // Christian Science Monitor;3/9/98, Vol. 90 Issue 70, p1 

    Discusses the vulnerability of the flow of information in the United States in 1998. The increased reliance on computers and the Internet, which has opened up new vulnerabilities; The highly publicized breach at the Pentagon; How computer breaches can be used for terrorism; The Presidential...

  • How to Deal Intelligently With Data Breaches. Durbin, Steve // CIO Insight;1/12/2015, p1 

    The article offers information on various aspects of data breaches and suggests ways for data breach prevention and response. Topics discussed include need of modified information security protection on a continuous basis, understanding the approach of organized criminals, malicious hackers and...

  • Devices To Launch And Control Cyber, Electronic And Information Attacks.  // AirGuide Online.com;5/25/2009, p1 

    The article reports that the U.S. military and industry is testing devices to launch and control cyber, electronic and information attacks. According to U.S. analysts, some combat areas' weaknesses have been depicted last year by Russian attack on Georgia. Several contracts to information...

  • DRM, consumers and the God chip. Gibbs, Mark // Network World;9/25/2006, Vol. 23 Issue 37, p104 

    The author reflects on the reliability on the initiated plan of Secure Video Processor (SVP) Alliance, an industry association which secures piracy protection in the U.S. He contends that the initiation of SVP's plan of digital rights management technology through the creation of God chip, a...

  • 2012 Prediction: The Year of FDSACC. McCourt, Mark // Security: Solutions for Enterprise Security Leaders;Jan2012, Vol. 49 Issue 1, p10 

    The article presents predictions for the 2012 Finally Doing Something About CyberCrime (FDSACC), which tackles the trend in cyber security in the U.S. It asserts that the Security 500 survey that was conducted in 2011 has shown that only 19% of Security 500 computer security officers (CSOs)...

  • Intelligence key to protecting data against fraud and espionage threats. Ashford, Warwick // Computer Weekly;11/22/2011, p7 

    The article focuses on the importance of information security in businesses as the value of information assets increase and threats from cyber crime rise. It asserts that many of the organisations' information security is not well integrated with the entire business, which either limits the...

  • Key Trends in Information Security for 2015. Papineni, Ramsunder // PC Quest;Dec2014, p49 

    The article discusses the key trends and developments in information security in 2015. It forecasts the emergence of security concerns on mobile applications that can potentially cause devastating consequences. It notes the potential of Ransomware, a Cryptolocker malware, to become a more...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics