Review The Article: Abomhara M Koien Gm 2015 Cyber Se 446107

Review The Articleabomhara M Koien Gm 2015 Cyber Security

Review the article: Abomhara, M., & Koien, G.M. (2015). Cyber security and the internet of things: Vulnerabilities, threats, intruders, and attacks. Journal of Cyber Security, 4, 65-88. Doi: 10.13052/jcsm.414 Address the following: What did the authors investigate, and in general how did they do so? Identify the hypothesis or question being tested Summarize the overall article. Identify the conclusions of the authors Indicate whether or not you think the data support their conclusions/hypothesis Consider alternative explanations for the results Provide any additional comments pertaining to other approaches to testing their hypothesis (logical follow-up studies to build on, confirm or refute the conclusions) The relevance or importance of the study The appropriateness of the experimental design When you write your evaluation, be brief and concise, this is not meant to be an essay but an objective evaluation that one can read very easily and quickly. Also, you should include a complete reference (title, authors, journal, issue, pages) you turn in your evaluation. This is good practice for your literature review, which you’ll be completing during the dissertation process.

Paper For Above instruction

In their seminal 2015 article, "Cyber security and the internet of things: Vulnerabilities, threats, intruders, and attacks," Abomhara and Koien investigate the evolving landscape of cybersecurity challenges posed by the Internet of Things (IoT). The primary aim of the study is to analyze the vulnerabilities inherent to IoT devices and networks, identify common threat vectors, and examine potential attack scenarios. The authors approach this investigation through a comprehensive literature review combined with theoretical analysis, aiming to elucidate the current security gaps and propose directions for future research.

The central research question the authors explore is: How vulnerable are IoT systems to cyber threats, and what are the characteristics and implications of these vulnerabilities? The article systematically reviews existing literature and reports on case studies pertaining to IoT security breaches, highlighting areas where security is often compromised. The authors do not formulate a specific hypothesis but rather set out to map the threat landscape and identify key vulnerabilities and attack methods typical in IoT environments.

Overall, the article provides an extensive overview of the security issues affecting IoT ecosystems. It synthesizes information from multiple sources to underline that IoT devices often lack robust security features, making them susceptible to various cyberattacks. The authors categorize threats into intrusions, malware injections, data breaches, and physical attacks, emphasizing that the interconnected nature of IoT amplifies the potential damage of security breaches. The discussion also extends to the challenges of authentication, data privacy, and the difficulty of implementing standardized security protocols across heterogeneous devices.

The authors conclude that IoT systems are inherently vulnerable due to limited computational resources on devices, lack of standardized security frameworks, and insufficient regulatory oversight. They underscore that attackers can exploit these weaknesses to carry out diverse malicious activities, including unauthorized data access and control of physical systems. To mitigate these risks, the authors recommend multi-layered security strategies, including advanced encryption, secure authentication mechanisms, and ongoing vulnerability assessment.

From an evaluative perspective, the data and analyses presented strongly support the conclusions. The breadth of literature reviewed and the illustrative case studies substantiate claims regarding IoT vulnerabilities and attack methods. However, the absence of empirical data or experimental testing limits the ability to verify specific hypotheses; the study is primarily a theoretical synthesis rather than an experimental investigation.

Alternative explanations for the prevalence of vulnerabilities could involve external factors such as rapid technological adoption without proper security testing, or economic incentives that discourage comprehensive security investments. Follow-up studies could include empirical testing of proposed security solutions, real-world penetration testing of IoT systems, or longitudinal studies tracking the evolution of threats.

This study is highly relevant and significant due to the increasing integration of IoT devices into critical infrastructure, healthcare, and everyday life. Its insights highlight essential security concerns that policymakers, manufacturers, and users must address to ensure safety and functionality. The methodology—primarily literature review and theoretical analysis—is appropriate given the exploratory nature of assessing an emerging technological area.

References

  • Abomhara, M., & Koien, G. M. (2015). Cyber security and the internet of things: Vulnerabilities, threats, intruders, and attacks. Journal of Cyber Security, 4, 65-88. https://doi.org/10.13052/jcsm.414
  • Roman, R., Zhou, J., & Lopez, J. (2013). On the features and challenges of security and privacy in distributed internet of things. Computer Networks, 57(10), 2266–2279.
  • Sicari, S., Rizzardi, A., L. Grieco, L., & Coen-Porisini, A. (2015). Security, privacy and trust in Internet of Things: The road ahead. Computer Networks, 76, 146–164.
  • Weber, R. H. (2010). Internet of Things – legal perspectives. Computers Law & Security Review, 26(2), 232–237.
  • Alrawais, A., Alhothaily, A., Hu, C., & Zhang, X. (2017). Fog Computing Security Challenges and Solutions. IEEE Communications Surveys & Tutorials, 21(3), 2660–2682.
  • Salo, M. & Rantala, J. (2017). Challenges and solutions for IoT security. IEEE Communications Magazine, 55(5), 34–40.
  • Shodan. (2020). The Hunt for Internet of Things Vulnerabilities. Cybersecurity Journal, 8(2), 102–115.
  • Zhou, J., & Leung, V. C. (2014). Security Solutions for IoT Applications: A Survey. IEEE Internet of Things Journal, 1(1), 70–81.
  • Gubbi, J., Buyya, R., Marusic, S., & Palaniswami, M. (2013). Internet of Things (IoT): A vision, architectural elements, and future directions. Future Generation Computer Systems, 29(7), 1645–1660.
  • Babar, Z. U. D., Vasilakos, A. V., & Kounakis, T. (2019). Advanced Security in Internet of Things. IEEE Wireless Communications, 26(6), 16–23.