Effects of Data Breaches on Internet of Things (IoT) Devices within the Proliferation of Daily-Life Integrated Devices
Journal Title: Engineering and Technology Journal - Year 2024, Vol 9, Issue 07
Abstract
IoT has revolutionized life around us very quickly. All houses, offices, and even most of the cities in turn are a blanket or mosaic figured out by inter-woven devices keeping to each other; this shows how life was finally distracted. It is presented as a technological marvel that will make life simpler, more efficient, and connected more than it has ever been. However, beneath this gleaming surface lurks a growing threat: the widespread nature of vulnerabilities in IoT devices. The systematic review method is the basis of this study, using Google Scholar and keywords such as "IoT security and consequences", to retrieve scholarly articles pertaining between 2015 – 2023. Research articles that had strict inclusion criteria were considered to evaluate their applicability in the relationship between IoT security vulnerabilities and ordinary lives. These consequences include from information leakage to denial-of-service attacks and unauthorized access. The risks and scale differences from economic losses to life safety hazards that threaten public security due to an intensifying interdependency of IoT applications. The repercussions impact the key segments such as health care and military applications, where more stringent security measures can be highlighted.
Authors and Affiliations
Rohith Vallabhaneni
Implementing the Based Weight Method using Game Theory for Faultfinding Lines in Electrical Power System
The Identification of critical transmission lines in a power system is crucial for ensuring its stability and reliability. Traditional methods often relay on static metrics, such as line loading or voltage deviations, w...
ESTABLISHMENT OF A DRONE WASTE WATER TREATMENT PLANTS BY REMOTE MONITOR SYSTEM
The effluent quality and operational performance of a wastewater treatment plant depend on the operational efficiency of the equipment used in the plant. Conventionally, general equipment maintenance in a wastewater trea...
Blockchain's Transformative Potential in Securing Digital Identities and Personal Data
This review paper explores the transformative potential of blockchain technology in securing digital identities and personal data. It examines various blockchain applications, including identity verification, self-sovere...
TURBIDITY-HYSTERETIC RESPONSE IN RIVER OSE, ONDO STATE, NIGERIA
Concentration-Discharge relationships are a key tool for understanding the sources and transport of material from watersheds to fluvial networks. Turbidity based estimating of suspended sediment concentration is widely u...
Analysis of Lightning Arrester Installation Location on Transformer 1 Bungaran Substation
Lightning arrester is a device used in substations to protect electrical equipment from voltage increases caused by solar circuits or lightning. The purpose of the study is to calculate the lighting arrester spark voltag...