Paper Title : Cyber Security and Internet of Things
ISSN : 2394-2231
Year of Publication : 2020
MLA Style: Deepak K.R. Singh "Cyber Security and Internet of Things " Volume 7 - Issue 6 November - December,2020 International Journal of Computer Techniques (IJCT) ,ISSN:2394-2231 , www.ijctjournal.org
APA Style: Deepak K.R. Singh "Cyber Security and Internet of Things " Volume 7 - Issue 6 November - December,2020 International Journal of Computer Techniques (IJCT) ,ISSN:2394-2231 , www.ijctjournal.org
This paper shows the Cybersecurity and IoT devices. According to SYSCOMM, the demand for IoT devices will be getting an increase. IoT devices are very reliable to use but they have a high rate of risk from the cyber-terrorist. With the rapid growth of the Internet-of-things (IoT), concerns about the security of IoT devices have become notable. This paper also shows some company methods to overcome the cyber-attack problem and demand for cybersecurity. Cyber-attacks are not new, but most IoT devices have not the ability to prevent themselves from cyber-attacks.
https://www.riverpublishers.com/journal_read_html_article.php?j=JCSM/4/1/4 https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4516335/  Check point 2018 security report. 2018. Available Online: https://www.checkpoint. com/downloads/product-related/report/2018- security-report.pdf.  The Open Web Application Security Project (OWASP). 2018. Available online: https:// www.swasc an.com/owasp/  Cyber Attack Trends Analysis Key Insights to Gear Up for in 2019. Available Online: http://www.snt.hr/boxcontent/ CheckPointSecurityReport2019_vol01.pdf  The Open Web Application Security Project OWASP Top 10—the ten most critical web application security risks. The OWASP Foundation. 2018.  Check Point Research Survey of IT Security Professionals, sample size: 443 participants. 2018.  Checked from this Jobs report demands https://www.herjavecgroup.com/2019-cybersecurity-jobs-report-cybersecurity-ventures/  Check Point Mobile Threat Research Publications. 2017. Available Online: https:// research.checkpoint.com/check-pointmobile-research-team-looks-back-2017/  Cyber Attack Trends Analysis Key Insights to Gear Up for in 2019. Available Online: http://www.snt.hr/boxcontent/ CheckPointSecurityReport2019_vol01.pdf  International Organization for Standardization. ISO/IEC 27032:2012. Infor mation technology—Security techniques— Guidelines for cybersecurity. 2012  Hazza Z.M., Aziz N.A. A new efficient text detection method for image spam filtering. Int Rev Comput Softw. 2015; 10(1):1–8.  Reuters, Landis+Gyr Technology Enables Full Service Smart Grid Coverage, March 31, 2009. .  .Kai Cao, Jiajia Gao, Song Gao, Chaobo Chen, "Application of Back-stepping Method on Innovative Indoor Quadrotor Test Platform", Control Automation Robotics and Vision (ICARCV) 2018 15th International Conference on, pp. 966-971, 2018.  Alexander Kuzmin, Evgeny Znak, "Blockchain-base structures for a secure and operate network of semi-autonomous Unmanned Aerial Vehicles", Service Operations and Logistics and Informatics (SOLI) 2018 IEEE International Conference on, pp. 32-37, 2018.  andor Plosz, Pal Varga, "Security and safety risk analysis of vision guided autonomous vehicles", Industrial Cyber-Physical Systems (ICPS) 2018 IEEE, pp. 193-198, 2018.  Trung Duc TRAN, Jean-Marc THIRIET, Nicolas MARCHAND, Amin EL MRABTI, Gabriele LUCULLI, "Methodology for risk management related to cyber-security of Unmanned Aircraft Systems", Emerging Technologies and Factory Automation (ETFA) 2019 24th IEEE International Conference on, pp. 695-702, 2019.  Guo Rong-xiao, Tian Ji-wei, Wang Bu-hong, Shang Fu-te, "Cyber-Physical Attack Threats Analysis for UAVs from CPS Perspective", Computer Engineering and Application (ICCEA) 2020 International Conference on, pp. 259-263, 2020.  .Seyyedali Hosseinalipour, Ali Rahmati, Huaiyu Dai, "Optimal Jammer Placement in UAV-assisted Relay Networks", Communications (ICC) ICC 2020 - 2020 IEEE International Conference on, pp. 1-6, 2020.  I.H. Lim, S. Hong, M.S. Choi, S.J. Lee, T.W. Kim, S.W. Lee, B.N. Ha, Security protocols against cyber attacks in the distribution automation system, IEEE Transactions on Power Delivery 25 (2010) 448–455.
Internet of Things, Cyber-attack, Cyber-Security.