Open Access Open Access  Restricted Access Subscription or Fee Access

Cyber Security in Modern Internet of Things - Systematic Review

Fran Casino, Thomas K. Dasaklis, Constantinos Patsakis

Abstract


Technology has a speedy development nowadays. Everyone in this world uses those technologies to update themselves in order to improve their lifestyles in the upcoming years. A backdoor in a computer system, a cryptosystem or an algorithm, is any secret method of bypassing normal authentication or security controls. They may exist for many reasons, including by original design or from poor configuration. They may have been added by an authorized party to allow some legitimate access, or by an attacker for malicious reasons; but regardless of the motives for their existence, they create a vulnerability. Backdoors can be very hard to detect, and detection of backdoors are usually discovered by someone who has access to application source code or intimate knowledge of Operating System of the computer. This paper discusses about the DDoS attack and its risk in the network. This paper gives the awareness of the DDoS attack and its vulnerabilities occurring in the network.


Keywords


IoT, DDoS Attack, CPS.

Full Text:

PDF

Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.