The Internet of Things (IoT) is a complex system of electronic devices interconnected through the Internet. The technological race among adversary nations to the United States of America is a catalyst for building the IoT. The Russian government’s detonation of nuclear weapons in 1952 and the launch of Sputnik I in 1957 motivated the United States to develop the ARPANET. Carnegie Mellon University’s Coca-Cola Machine status led to the creation of the first ARPANET connected device. IoT devices range in size and shape to include but are not limited to smartphones, medical devices, light bulbs, satellites, routers, refrigerators, and televisions. The purpose of this research project was to analyze the cybersecurity of the IoT devices to provide recommendations for ameliorating the security of IoT devices. This project intended to answer what are the cybersecurity attack vectors of IoT devices, can the cybersecurity weaknesses within IoT devices be identified and mitigated, what is the national security threat related to IoT device cybersecurity? The findings conclude that IoT devices are subject to cyber-attacks through the principal IoT device components, which include hardware, software, and wireless connectivity. The IoT devices and their component creation require cybersecurity risk management at all stages of the IoT device life cycle. Attack vector mitigation finds standardization, education, and experience as solutions to lessen the risks. Standards connect IoT device cybersecurity to national security while standardization and education mitigate the risks. The threat to national security is the outsourced manufacturing of IoT device components to adversary nations.
|Commitee:||Hagestad, William, II, Popyack, Leonard|
|School Location:||United States -- New York|
|Source:||MAI 82/3(E), Masters Abstracts International|
|Subjects:||Computer science, Criminology, Information science|
|Keywords:||Attack vectors, DoD, IoTSF, NIST|
Copyright in each Dissertation and Thesis is retained by the author. All Rights Reserved
The supplemental file or files you are about to download were provided to ProQuest by the author as part of a
dissertation or thesis. The supplemental files are provided "AS IS" without warranty. ProQuest is not responsible for the
content, format or impact on the supplemental file(s) on our system. in some cases, the file type may be unknown or
may be a .exe file. We recommend caution as you open such files.
Copyright of the original materials contained in the supplemental file is retained by the author and your access to the
supplemental files is subject to the ProQuest Terms and Conditions of use.
Depending on the size of the file(s) you are downloading, the system may take some time to download them. Please be