Technical Report
Writing (TRW)
Presented to :
Ma’am Anam Amin
Cybersecurity threats Presented by:
in the age of Internet
of things (IoT) Khateeja Aftab 2023-BBIT-09
Samaha Saif 2023-BBIT-33
Ali Haider 2023-BBIT-67
Momna Mansoor 2023-BBIT-71
Noor 2023-BBIT-83
Aqsa Ali 2023-BBIT-86
Introduction
IoT connects devices, sensors, and objects for real-
time data exchange.
Enables applications in smart homes, healthcare, and
industry.
Rising connectivity brings significant cybersecurity
challenges like data breaches and botnets.
Calls for robust measures and continuous innovation
to secure the IoT ecosystem.
Literature review
IoT Threats:
Threats include data breaches, malware, botnets, and weak encryption.
Challenges:
Challenges include Device diversity, resource constraints, and lack of
standardization & Privacy risks from sensitive data collection.
Protective Measures:
Measures needed for Device security are secure boot, encryption & some Network
defenses
Future Directions:
Adaptive policies, privacy-preserving tech and Collaboration among experts for
innovative solutions.
Significance
IoT enhances efficiency and automation in sectors like
healthcare, smart homes, and industry.
Provides real-time data insights and transformative
applications.
Robust cybersecurity is crucial to ensure privacy, trust,
and the sustainable growth of IoT technologies.
Objective
To review cybersecurity threats in the IoT
ecosystem, including data breaches, malware,
and physical manipulation.
To explore protective measures like
encryption, secure boot, and intrusion
detection systems.
To highlight the need for collaboration and
emerging technologies (e.g., blockchain, AI)
for enhanced IoT security.
Methodology
The methodology of the paper is qualitative because it focuses on analyzing
and reviewing existing literature, frameworks, and technologies related to IoT
cybersecurity. Instead of collecting numerical data or conducting
experiments, the study synthesizes insights from prior research to categorize
threats, evaluate protective measures, and discuss challenges and future
directions.
Survey analysis
Survey analysis
Survey analysis
Survey analysis
Conclusion
IoT offers transformative benefits but faces significant cybersecurity
challenges, including data breaches, malware, and privacy concerns.
Robust security measures like encryption, secure boot processes, and
regulatory compliance are essential for safeguarding IoT systems.
Collaboration among stakeholders, leveraging emerging technologies like
AI and blockchain, is crucial for a secure IoT future.
Ensuring IoT security is not just a technical need but a societal imperative
to protect privacy, trust, and critical infrastructures.
References The references section of the paper cites various scholarly
sources used for the review. Some key references include:
1. Al-Fuqaha et al. (2015) – Survey on IoT technologies and
applications.
2. Zhang et al. (2014) – Overview of IoT security and
privacy challenges.
3. Antonakakis et al. (2017) – Analysis of the Mirai botnet in
IoT systems.
4. Dorri et al. (2017) – Role of blockchain in securing IoT
environments.
5. Sicari et al. (2015) – Discussion on trust, privacy, and
security in IoT.
Appendix
Key Abbreviations:
IoT: Internet of Things
DDoS: Distributed Denial of Service
AI: Artificial Intelligence
ML: Machine Learning
Key Definitions:
IoT: A network of interconnected devices sharing data.
Blockchain: Decentralized, tamper-proof technology for secure data.
Intrusion Detection Systems: Tools to monitor and detect suspicious activities.
Case Study Example:
Mirai Botnet Attack (2016): IoT devices were hacked to execute DDoS attacks,
disrupting global internet services.
Thank you!!