On Cyber Threats to Smart Digital Environments

被引:5
|
作者
Kettani, Houssain [1 ]
Cannistra, Robert M. [1 ,2 ]
机构
[1] Dakota State Univ, Beacom Coll Comp & Cyber Sci, Madison, SD 57042 USA
[2] Marist Coll, Sch Comp Sci & Math, Poughkeepsie, NY USA
关键词
Threat Landscape; Cyber Threat Intelligence; CTI; Cyber Security; Cyber Issues; Threat Agents; Threat Vectors;
D O I
10.1145/3289100.3289130
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cyber threats and attacks have significantly increased in complexity and quantity throughout this past year. In this paper, the top fifteen cyber threats and trends are articulated in detail to provide awareness throughout the community and raising awareness. Specific attack vectors, mitigation techniques, kill chain and threat agents addressing Smart Digital Environments (SDE), including Internet of Things (IoT), are discussed. Due to the rising number of IoT and embedded firmware devices within ubiquitous computing environments such as smart homes, smart businesses and smart cities, the top fifteen cyber threats are being used in a comprehensive manner to take advantage of vulnerabilities and launch cyber operations using multiple attack vectors. What began as ubiquitous, or pervasive, computing is now matured to smart environments where the vulnerabilities and threats are widespread.
引用
收藏
页码:183 / 188
页数:6
相关论文
共 50 条
  • [31] Edge enabled development of Smart Cyber-Physical Environments
    Cicirelli, Franco
    Fortino, Giancarlo
    Guerrieri, Antonio
    Spezzano, Giandomenico
    Vinci, Andrea
    2016 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS (SMC), 2016, : 3463 - 3468
  • [32] SmartyCo: Managing Cyber-Physical Systems for Smart Environments
    Romero, Daniel
    Quinton, Clement
    Duchien, Laurence
    Seinturier, Lionel
    Valdez, Carolina
    SOFTWARE ARCHITECTURE (ECSA 2015), 2015, 9278 : 294 - 302
  • [33] THREATS TO CYBER SECURITY
    Tudor, Ana-Maria
    LAW BETWEEN MODERNIZATION AND TRADITION - IMPLICATIONS FOR THE LEGAL, POLITICAL, ADMINISTRATIVE AND PUBLIC ORDER ORGANIZATION, 2015, : 659 - 664
  • [34] Ship cyber threats
    Partyka, Matthew
    McDonald, Bruce
    Marine Technology, 2018, 55 (02) : 22 - 24
  • [35] Addressing cyber threats
    Radler, Marilyn
    OIL & GAS JOURNAL, 2011, 109 (17) : 22 - 22
  • [36] Cyber Threats Mega Trends in Cyber Space
    Rusi, Tarja
    Lehto, Martti
    PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2017), 2017, : 323 - 331
  • [37] Cyber-Security Threats and Side-Channel Attacks for Digital Agriculture
    Alahmadi, Adel N.
    Rehman, Saeed Ur
    Alhazmi, Husain S.
    Glynn, David G.
    Shoaib, Hatoon
    Sole, Patrick
    SENSORS, 2022, 22 (09)
  • [38] Driving Safely in the Digital Age: Securing Connected Cars Against Cyber Threats
    Jayakumar, Saranya
    Sadiq, Ali Safaa
    Hamdare, Safa
    Kaiwartya, Omprakash
    2024 IEEE International Conference on Automatic Control and Intelligent Systems, I2CACIS 2024 - Proceedings, 2024, : 151 - 156
  • [39] Overview on Cyber Security Threats Involved in the Implementation of Smart Grid in Countries like India
    Kumar, Venkatesh
    Inbaraj, Prince
    PROCEEDING OF THE INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS, BIG DATA AND IOT (ICCBI-2018), 2020, 31 : 678 - 684
  • [40] Cyber Threats and Cyber Deception in Hybrid Warfare
    Steingartner, William
    Galinec, Darko
    ACTA POLYTECHNICA HUNGARICA, 2021, 18 (03) : 25 - 45