Araştırma Makalesi
BibTex RIS Kaynak Göster

A Critical Analysis on Internet of Things: Features and Vulnerabilities

Yıl 2018, Cilt: 10 , 68 - 76, 12.09.2018

Öz

Smart devices have completely
changed how society functions both outside and inside the home. A major concern
is the Internet of Things (IoT), and the lack of awareness by the public of the
limited data security built around IoT devices (Raggett, 2016). The purpose of
this research is to investigate how a reliance on IoT devices within the home
can come at the expense of personal privacy. There has been limited research
conducted on how much, and what data is transmitted by IoT devices. This
research focused upon data privacy and security concerns, privacy laws, law
enforcement capabilities and legal precedents pertaining to personal privacy
and IoT devices. The storage, transmission, sharing and retention of personal
information through connected devices were found to pose substantial privacy
concerns. There is a deficiency in public knowledge on the subject of IoT
because people are putting a greater emphasis on functionality and design with
these IoT tools that provide ease of life, but less regard for their own
individual privacy. People may have reached a point where they have allowed too
many other entities such as government, corporations, and data aggregators access
to their personal information but limited knowledge as to what is being
transmitted. Based on the research it seems that humans put a lesser value on
their own privacy and personal information because the world around them is
consumed by a pursuit of things like vanity, pleasure, and enjoyment. Companies
should be required to provide a baseline explanation in detail exactly what,
where, how, who, and anything else relating to the data transmission that
contains any personal information about the consumer using the device. For
anybody who doesn’t have a working knowledge of what that traffic should look
like, it should be explained in reasonable terms so those who are not technical
can understand the data capture.

Kaynakça

  • Banafa, A. (2014). IoT Standardization and Implementation Challenges. IEEE. org Newsletter. Berners-Lee, T. (2017). I invented the web. Here are three things we need to change to save it. Retrieved March 11, 2017. from https://www.theguardian.com/technology/2017/mar/11/tim- berners-lee-web-inventor-save-internet Berreby, D. (2017). Click To Agree With What? No One Reads Terms Of Service, Studies Confirm. Retrieved March 03, 2017. from https://www.theguardian.com/technology/2017/mar/03/terms-of- service-online-contracts-fine-print Borgia, E. (2014). The Internet of Things Vision: Key Features. Applications And Open Issues Computer Communications, 54, 1–31. Brill, H. (2017). What Rules Apply to Information Privacy and the Internet of Things?. The Santa Clara High Technology Law Journal. Retrieved 29 October, 2017. from https://techlawquestions.com/home/2017/7/17/what-rules-apply-to-information-privacy- and-the-internet-of-things. Daitch, H. (2017). 2017 Data Breaches - The Worst Breaches, So Far. IdentityForce. Retrieved September 29, 2017. from https://www.identityforce.com/blog/2017-data-breaches DeNisco, A. (2017). The Five Industries Leading The Iot Revolution. Retrieved June 23, 2017. from http://www.zdnet.com/article/the-five-industries-leading-the-iot-revolution/ Equifax Inc. (2017). Equifax Announces Cybersecurity Incident Involving Consumer Information. Retrieved December 29, 2017. from https://investor.equifax.com/news-and-events/news/2017/09- 07-2017-213000628 Fernandes, E., Jung, J., & Prakash, A. (2016, May). Security Analysis Of Emerging Smart Home Applications. In Security and Privacy (SP), 2016 IEEE Symposium on (pp. 636-654). IEEE. FTC (2015). The Internet of Things: Privacy and Security in a Connected World. Retrşeved 01 March 2018. from https://www.ftc.gov/system/files/documents/reports/federal-trade-commission-staff-report-november-2013-workshop-entitled-internet-things-privacy/150127iotrpt.pdf Gartner (2016). Gartner Says By 2020, More Than Half Of Major New Business Processes And Systems Will Incorporate Some Element Of The Internet Of Things [Press release]. Retrieved 23 June, 2017. from https://www.gartner.com/newsroom/id/3185623 Glancy, R. (2014). Will You Read This Article About Terms And Conditions? You Really Should. Retrieved April 24, 2018. from https://www.theguardian.com/commentisfree/2014/apr/24/terms- and-conditions-online-small-print-information Koblin, J. (2016). How Much Do We Love TV? Let Us Count the Ways. Retrieved 22 October, 2017. from https://www.nytimes.com/2016/07/01/business/media/nielsen-survey-media-viewing.html Li, S., & Xu, L. (2017). Securing The Internet Of Things. Cambridge, MA: Syngress. Lord, N. (2017). The History Of Data Breaches. Retrieved July 27, 2017. from https://digitalguardian.com/blog/history-data-breaches Mehta, R. (2017). How The Iot Will Explode At 2020. Retrieved August 19, 2017. from http://customerthink.com/how-the-iot-will-explode-at-2020/ Maddox, T. (2015). The dark side of wearables: How they're secretly jeopardizing your security and privacy. Retrieved January 19, 2018. from http://www.techrepublic.com/article/the-dark-side-of- wearables-how-theyre-secretly-jeopardizing-your-security-and-privacy/ Martin, J., Meade, C., & Nusraty, W. (2017). A Summary Of The Recently Introduced Internet Of Things (Iot) Cybersecurity Improvement Act Of 2017. Retrieved October 04, 2017, from https://www.insideprivacy.com/data-security/cybersecurity/a-summary-of- the-recently-introduced-internet-of-things-iot-cybersecurity-improvement-act-of-2017/ Massive Media. (2016). Mirai Malware: How To Protect Yourself From The Internet Of Things (Iot Exploit). Retrieved October 31, 2017. from https://www.massivealliance.com/2016/10/31/mirai-malware-protect-internet-things-iot- exploit/ Montalbano, E. (2017). 300 Billion Passwords? Internet Of Things Growth Poses Unprecedented Threat By 2020. Retrieved February 01, 2018. from https://securityledger.com/2017/02/300- billion-passwords-internet-of-things-growth-poses-unprecedented-threat-by-2020/ Newman, S. (2017). Service Providers: The Gatekeepers Of Internet Security. Network Security, 5, 5-7. doi:10.1016/s1353-4858(17)30048-x Palmer, D. (2017). Is 'Admin' Password Leaving Your Iot Device Vulnerable To Cyberattacks? Retrieved April 26, 2018. from http://www.zdnet.com/article/is-admin-password-leaving- your-iot-device-vulnerable-to-cyberattacks/ Perez, S. (2017). U.S. Consumers Now Spend 5 Hours Per Day On Mobile Devices. Retrieved March 3, 2018. from https://techcrunch.com/2017/03/03/u-s-consumers-now-spend-5-hours- per-day-on-mobile-devices Ponemon Institute (2017). 2017 Cost of Data Breach Study: United States. 12, 4-5, Retrieved October 09, 2017. from https://www- 01.ibm.com/marketing/iwm/dre/signup?source=urx-15764&S_PKG=ov58458 Rouse, M. (2016). What is Internet of Things (IoT)? Retrieved March 12, 2018. from http://internetofthingsagenda.techtarget.com/definition/Internet-of-Things-IoT Symantec (2017). Securing the Internet of Thing. Retrieved January 6, 2018. from https://sg.norton.com/internetsecurity-iot-securing-the-internet-of-things.html Talamantes, J. (2016). Google Dorking And Shodan. Retrieved from November 9, 2017. http://www.elp.com/articles/powergrid_international/print/volume-21/issue- 11/features/google-dorking-and-shodan.html Thielman, S., Hunt, E. (2016). Cyber Attack: Hackers 'Weaponised' Everyday Devices With Malware. Retrieved October 22, 2017. from https://www.theguardian.com/technology/2016/oct/22/cyber-attack-hackers-weaponised- everyday-devices-with-malware-to-mount-assault Turgut, D., Bölöni, L. (2017). Value Of Information And Cost Of Privacy In The Internet Of Things. IEEE Communications Magazine, 55(9), 62-66. Vaughan-Nichols, S. J. (2017). How To Keep Your Smart TV From Spying On You. Retrieved March 8, 2017. from http://www.zdnet.com/article/how-to-keep-your-smart-tv-from-spying- on-you/ Wadhwa, V. (2015). When Your Scale And Fridge Conspire To Make You Lose Weight, The Internet Of Things Will Have Gone Too Far. Retrieved June 29, 2017. from https://www.washingtonpost.com/news/innovations/wp/2015/06/29/when-your-scale- and-fridge-conspire-to-make-you-lose-weight-the-internet-of-things-will-have-gone-too- far/?utm_term=.6ffbbfc4131c Weber, R. H. (2016). Governance Of The Internet Of Things—From Infancy To First Attempts Of Implementation?. Laws, 5(3), 28. Zatz, C. J., Aradi, L. O., Meadows, J. L., & Mathis, P. (2017). Recent Iot Device Cases. Lexology. Retrieved July 29, 2017. from https://www.lexology.com/library/detail.aspx?g=97b70db8- b67d-4e8b-b9bf-d4beaf12eddd
Yıl 2018, Cilt: 10 , 68 - 76, 12.09.2018

Öz

Kaynakça

  • Banafa, A. (2014). IoT Standardization and Implementation Challenges. IEEE. org Newsletter. Berners-Lee, T. (2017). I invented the web. Here are three things we need to change to save it. Retrieved March 11, 2017. from https://www.theguardian.com/technology/2017/mar/11/tim- berners-lee-web-inventor-save-internet Berreby, D. (2017). Click To Agree With What? No One Reads Terms Of Service, Studies Confirm. Retrieved March 03, 2017. from https://www.theguardian.com/technology/2017/mar/03/terms-of- service-online-contracts-fine-print Borgia, E. (2014). The Internet of Things Vision: Key Features. Applications And Open Issues Computer Communications, 54, 1–31. Brill, H. (2017). What Rules Apply to Information Privacy and the Internet of Things?. The Santa Clara High Technology Law Journal. Retrieved 29 October, 2017. from https://techlawquestions.com/home/2017/7/17/what-rules-apply-to-information-privacy- and-the-internet-of-things. Daitch, H. (2017). 2017 Data Breaches - The Worst Breaches, So Far. IdentityForce. Retrieved September 29, 2017. from https://www.identityforce.com/blog/2017-data-breaches DeNisco, A. (2017). The Five Industries Leading The Iot Revolution. Retrieved June 23, 2017. from http://www.zdnet.com/article/the-five-industries-leading-the-iot-revolution/ Equifax Inc. (2017). Equifax Announces Cybersecurity Incident Involving Consumer Information. Retrieved December 29, 2017. from https://investor.equifax.com/news-and-events/news/2017/09- 07-2017-213000628 Fernandes, E., Jung, J., & Prakash, A. (2016, May). Security Analysis Of Emerging Smart Home Applications. In Security and Privacy (SP), 2016 IEEE Symposium on (pp. 636-654). IEEE. FTC (2015). The Internet of Things: Privacy and Security in a Connected World. Retrşeved 01 March 2018. from https://www.ftc.gov/system/files/documents/reports/federal-trade-commission-staff-report-november-2013-workshop-entitled-internet-things-privacy/150127iotrpt.pdf Gartner (2016). Gartner Says By 2020, More Than Half Of Major New Business Processes And Systems Will Incorporate Some Element Of The Internet Of Things [Press release]. Retrieved 23 June, 2017. from https://www.gartner.com/newsroom/id/3185623 Glancy, R. (2014). Will You Read This Article About Terms And Conditions? You Really Should. Retrieved April 24, 2018. from https://www.theguardian.com/commentisfree/2014/apr/24/terms- and-conditions-online-small-print-information Koblin, J. (2016). How Much Do We Love TV? Let Us Count the Ways. Retrieved 22 October, 2017. from https://www.nytimes.com/2016/07/01/business/media/nielsen-survey-media-viewing.html Li, S., & Xu, L. (2017). Securing The Internet Of Things. Cambridge, MA: Syngress. Lord, N. (2017). The History Of Data Breaches. Retrieved July 27, 2017. from https://digitalguardian.com/blog/history-data-breaches Mehta, R. (2017). How The Iot Will Explode At 2020. Retrieved August 19, 2017. from http://customerthink.com/how-the-iot-will-explode-at-2020/ Maddox, T. (2015). The dark side of wearables: How they're secretly jeopardizing your security and privacy. Retrieved January 19, 2018. from http://www.techrepublic.com/article/the-dark-side-of- wearables-how-theyre-secretly-jeopardizing-your-security-and-privacy/ Martin, J., Meade, C., & Nusraty, W. (2017). A Summary Of The Recently Introduced Internet Of Things (Iot) Cybersecurity Improvement Act Of 2017. Retrieved October 04, 2017, from https://www.insideprivacy.com/data-security/cybersecurity/a-summary-of- the-recently-introduced-internet-of-things-iot-cybersecurity-improvement-act-of-2017/ Massive Media. (2016). Mirai Malware: How To Protect Yourself From The Internet Of Things (Iot Exploit). Retrieved October 31, 2017. from https://www.massivealliance.com/2016/10/31/mirai-malware-protect-internet-things-iot- exploit/ Montalbano, E. (2017). 300 Billion Passwords? Internet Of Things Growth Poses Unprecedented Threat By 2020. Retrieved February 01, 2018. from https://securityledger.com/2017/02/300- billion-passwords-internet-of-things-growth-poses-unprecedented-threat-by-2020/ Newman, S. (2017). Service Providers: The Gatekeepers Of Internet Security. Network Security, 5, 5-7. doi:10.1016/s1353-4858(17)30048-x Palmer, D. (2017). Is 'Admin' Password Leaving Your Iot Device Vulnerable To Cyberattacks? Retrieved April 26, 2018. from http://www.zdnet.com/article/is-admin-password-leaving- your-iot-device-vulnerable-to-cyberattacks/ Perez, S. (2017). U.S. Consumers Now Spend 5 Hours Per Day On Mobile Devices. Retrieved March 3, 2018. from https://techcrunch.com/2017/03/03/u-s-consumers-now-spend-5-hours- per-day-on-mobile-devices Ponemon Institute (2017). 2017 Cost of Data Breach Study: United States. 12, 4-5, Retrieved October 09, 2017. from https://www- 01.ibm.com/marketing/iwm/dre/signup?source=urx-15764&S_PKG=ov58458 Rouse, M. (2016). What is Internet of Things (IoT)? Retrieved March 12, 2018. from http://internetofthingsagenda.techtarget.com/definition/Internet-of-Things-IoT Symantec (2017). Securing the Internet of Thing. Retrieved January 6, 2018. from https://sg.norton.com/internetsecurity-iot-securing-the-internet-of-things.html Talamantes, J. (2016). Google Dorking And Shodan. Retrieved from November 9, 2017. http://www.elp.com/articles/powergrid_international/print/volume-21/issue- 11/features/google-dorking-and-shodan.html Thielman, S., Hunt, E. (2016). Cyber Attack: Hackers 'Weaponised' Everyday Devices With Malware. Retrieved October 22, 2017. from https://www.theguardian.com/technology/2016/oct/22/cyber-attack-hackers-weaponised- everyday-devices-with-malware-to-mount-assault Turgut, D., Bölöni, L. (2017). Value Of Information And Cost Of Privacy In The Internet Of Things. IEEE Communications Magazine, 55(9), 62-66. Vaughan-Nichols, S. J. (2017). How To Keep Your Smart TV From Spying On You. Retrieved March 8, 2017. from http://www.zdnet.com/article/how-to-keep-your-smart-tv-from-spying- on-you/ Wadhwa, V. (2015). When Your Scale And Fridge Conspire To Make You Lose Weight, The Internet Of Things Will Have Gone Too Far. Retrieved June 29, 2017. from https://www.washingtonpost.com/news/innovations/wp/2015/06/29/when-your-scale- and-fridge-conspire-to-make-you-lose-weight-the-internet-of-things-will-have-gone-too- far/?utm_term=.6ffbbfc4131c Weber, R. H. (2016). Governance Of The Internet Of Things—From Infancy To First Attempts Of Implementation?. Laws, 5(3), 28. Zatz, C. J., Aradi, L. O., Meadows, J. L., & Mathis, P. (2017). Recent Iot Device Cases. Lexology. Retrieved July 29, 2017. from https://www.lexology.com/library/detail.aspx?g=97b70db8- b67d-4e8b-b9bf-d4beaf12eddd
Toplam 1 adet kaynakça vardır.

Ayrıntılar

Birincil Dil İngilizce
Bölüm Articles
Yazarlar

Naciye Guliz Ugur Bu kişi benim

Merve Turkmen Barutcu Bu kişi benim

Yayımlanma Tarihi 12 Eylül 2018
Yayımlandığı Sayı Yıl 2018 Cilt: 10

Kaynak Göster

APA Ugur, N. G., & Turkmen Barutcu, M. (2018). A Critical Analysis on Internet of Things: Features and Vulnerabilities. The Eurasia Proceedings of Educational and Social Sciences, 10, 68-76.