Reference Hub3
The Impact of Internet of Things Self-Security on Daily Business and Business Continuity

The Impact of Internet of Things Self-Security on Daily Business and Business Continuity

Hasan Emre Yılmaz, Altan Sirel, M. Fevzi Esen
ISBN13: 9781522584070|ISBN10: 1522584072|EISBN13: 9781522584087
DOI: 10.4018/978-1-5225-8407-0.ch021
Cite Chapter Cite Chapter

MLA

Yılmaz, Hasan Emre, et al. "The Impact of Internet of Things Self-Security on Daily Business and Business Continuity." Handbook of Research on Cloud Computing and Big Data Applications in IoT, edited by B. B. Gupta and Dharma P. Agrawal, IGI Global, 2019, pp. 481-498. https://doi.org/10.4018/978-1-5225-8407-0.ch021

APA

Yılmaz, H. E., Sirel, A., & Esen, M. F. (2019). The Impact of Internet of Things Self-Security on Daily Business and Business Continuity. In B. Gupta & D. Agrawal (Eds.), Handbook of Research on Cloud Computing and Big Data Applications in IoT (pp. 481-498). IGI Global. https://doi.org/10.4018/978-1-5225-8407-0.ch021

Chicago

Yılmaz, Hasan Emre, Altan Sirel, and M. Fevzi Esen. "The Impact of Internet of Things Self-Security on Daily Business and Business Continuity." In Handbook of Research on Cloud Computing and Big Data Applications in IoT, edited by B. B. Gupta and Dharma P. Agrawal, 481-498. Hershey, PA: IGI Global, 2019. https://doi.org/10.4018/978-1-5225-8407-0.ch021

Export Reference

Mendeley
Favorite

Abstract

The number of devices operating on IoTs has exceeded billions globally. This chapter aims to examine the cyber security risks of such systems with widespread use and investigate some IoT vulnerabilities. It examines the effects of these vulnerabilities on business life and personal life, and the precautions to be taken to eliminate them. In addition, the regulations and measures to be applied at the state level is discussed. The safe use of IoT systems cannot be achieved solely by individual awareness. An awareness and sense of responsibility in the manufacturing layer is also a must. This chapter investigates the reasons behind the lack of security precautions taken in the manufacturing phase of IoT devices and suggests solutions. It also discusses the details of malwares such as Mirai, whose targets are mainly IoT vulnerabilities.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.