Effects of Data Breaches on Internet of Things (IoT) Devices within the Proliferation of Daily-Life Integrated Devices

Journal Title: Engineering and Technology Journal - Year 2024, Vol 9, Issue 07

Abstract

IoT has revolutionized life around us very quickly. All houses, offices, and even most of the cities in turn are a blanket or mosaic figured out by inter-woven devices keeping to each other; this shows how life was finally distracted. It is presented as a technological marvel that will make life simpler, more efficient, and connected more than it has ever been. However, beneath this gleaming surface lurks a growing threat: the widespread nature of vulnerabilities in IoT devices. The systematic review method is the basis of this study, using Google Scholar and keywords such as "IoT security and consequences", to retrieve scholarly articles pertaining between 2015 – 2023. Research articles that had strict inclusion criteria were considered to evaluate their applicability in the relationship between IoT security vulnerabilities and ordinary lives. These consequences include from information leakage to denial-of-service attacks and unauthorized access. The risks and scale differences from economic losses to life safety hazards that threaten public security due to an intensifying interdependency of IoT applications. The repercussions impact the key segments such as health care and military applications, where more stringent security measures can be highlighted.

Authors and Affiliations

Rohith Vallabhaneni

Keywords

Related Articles

ASSESSMENT OF TWO ENTERPRISE ARCHITECTURE SOFTWARES FOR PRESENTATION FOR UNIVERSITY STUDENTS

Enterprise architects work with stakeholders, both leadership and subject matter experts, to build a holistic view of the organization's strategy, processes, information, and information technology assets. The role of th...

Design and Implementation of Sensored Brushless DC Motor Control Using dsPIC30F4012 for CW/CCW Bidirectional Rotation

This paper presents the development of BLDC (Brushless DC) motor control based on dsPIC30F4012. The system is designed to control motor rotation in clockwise (CW) and counter clockwise (CCW) directions. There are 3 input...

DESIGN OF A HUMAN BODY TEMPERATURE MEASURING INSTRUMENT WITH A CONTACTLESS BASED SYSTEM INTERNET OF THINGS

Measuring body temperature is one way of physical assessment that is used to determine the state of human health or to test human responses. This factor is the most important to detect whether a person is experiencing sy...

CHEMICAL TREATMENT OF WATER STREAM IN A CONTINUOUS FLOWING PROCESS WITH DOPING TECHNIQUE: CALCIUM HYDROXIDE (CA(OH)2) AS A CASE STUDY

Water from rivers are often characterised with variable compositions influenced by the environment on the path of flow. Treatment with chemicals additives to obtain a level of purification will require repeated test to a...

Reclamation Suitability Evaluation of Damaged Mined Land Based on the Limit Condition Method-Example of Pingdingshan Tianan Ten Coal Mine

Reclamation suitability evaluation is the basis for determining the reuse direction of damaged land. Limit condition method is the most widely used method in land reclamation suitability evaluation at present. In this pa...

Download PDF file
  • EP ID EP740497
  • DOI 10.47191/etj/v9i07.13
  • Views 44
  • Downloads 0

How To Cite

Rohith Vallabhaneni (2024). Effects of Data Breaches on Internet of Things (IoT) Devices within the Proliferation of Daily-Life Integrated Devices. Engineering and Technology Journal, 9(07), -. https://europub.co.uk/articles/-A-740497