Reference Hub1
IoT and Cyber Security: Introduction, Attacks, and Preventive Steps

IoT and Cyber Security: Introduction, Attacks, and Preventive Steps

Keyurbhai Arvindbhai Jani, Nirbhay Chaubey
Copyright: © 2020 |Pages: 33
ISBN13: 9781799822530|ISBN10: 1799822532|ISBN13 Softcover: 9781799822547|EISBN13: 9781799822554
DOI: 10.4018/978-1-7998-2253-0.ch010
Cite Chapter Cite Chapter

MLA

Jani, Keyurbhai Arvindbhai, and Nirbhay Chaubey. "IoT and Cyber Security: Introduction, Attacks, and Preventive Steps." Quantum Cryptography and the Future of Cyber Security, edited by Nirbhay Kumar Chaubey and Bhavesh B. Prajapati, IGI Global, 2020, pp. 203-235. https://doi.org/10.4018/978-1-7998-2253-0.ch010

APA

Jani, K. A. & Chaubey, N. (2020). IoT and Cyber Security: Introduction, Attacks, and Preventive Steps. In N. Chaubey & B. Prajapati (Eds.), Quantum Cryptography and the Future of Cyber Security (pp. 203-235). IGI Global. https://doi.org/10.4018/978-1-7998-2253-0.ch010

Chicago

Jani, Keyurbhai Arvindbhai, and Nirbhay Chaubey. "IoT and Cyber Security: Introduction, Attacks, and Preventive Steps." In Quantum Cryptography and the Future of Cyber Security, edited by Nirbhay Kumar Chaubey and Bhavesh B. Prajapati, 203-235. Hershey, PA: IGI Global, 2020. https://doi.org/10.4018/978-1-7998-2253-0.ch010

Export Reference

Mendeley
Favorite

Abstract

The Internet of Things (IoT) connects different IoT smart objects around people to make their life easier by connecting them with the internet, which leads IoT environments vulnerable to many attacks. This chapter has few main objectives: to understand basics of IoT; different types of attacks possible in IoT; and prevention steps to secure IoT environment at some extent. Therefore, this chapter is mainly divided into three parts. In first part discusses IoT devices and application of it; the second part is about cyber-attacks possible on IoT environments; and in the third part is discussed prevention and recommendation steps to avoid damage from different attacks.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.