Handbook of Research on Information and Cyber Security in the Fourth Industrial Revolution by Ziska Fields
Author:Ziska Fields
Language: eng
Format: epub
Publisher: IGI Global
IoT solutions are built with advanced features for degrading cyber threat and safeguarding IoT infrastructure. This method also warrants that IoT devices are properly configured to provide continuous system operability (Marsan, 2015). Vendors often introduce security measures for guarding IoT infrastructure solutions from cyber risks/threats. The next section discusses byzantine fault tolerance and its specifics related to cyber resilience domain. Byzantine Fault Tolerance (BFT) is a method that plays a significant role in cyber resilience capabilities (Olstik, 2014; Schneier, n.d.). This solution stems from security issues: vulnerabilities, methods and techniques applicable to IoT global-scale. The next section aims at byzantine fault tolerance and how this technology may apply to cyber resilience. Besides, BFT is also a process aiming to protect IoT objects against Byzantineâs General (BG) attacks. Distributed systems are complex, autonomous and independently deployed to IoT infrastructure (Geer, 2014; Wind River, 2015). This includes IoT autonomous devices and intelligent systems, which do not interact with each other. Nevertheless, autonomous objects are self-governed and are designed to interact with other IoT devices. Such devices and systems may also lead to accidental malfunctions. Any device or system failures and remediation can be exhibited using the classic BG issues. BG methods form consents for coordinating many actions. These activities may be difficult to implement, if only connected as autonomous and independent systems. Such lack of interoperability may be due to limited technical specifications. (Geer, 2014). BFT attacks may be launched asynchronously or via distributed IoT computing environments. In BFT environment, both âhybrid and practical methodsâ continue to pose key security challenges. In addition, BFT security issues are based on consensus voting algorithms. The authors conclude that, BFT affects the resilience of IoT security devices. Having the ability to degrade any system redundancy and introduce random hardware or application failures on IoT infrastructure may be one of the BFT challenges affecting organizations.
Lacking best practices and advanced security solutions to protect and mitigate infrastructure security vulnerabilities, would further pose many challenges on the network. The following sections discuss DDoS attacks (Cyber Resilience, 2016). These are methods and techniques that attackers use to send malicious codes, to single/multiple devices or systems (Kim et al, 2012).
Use Case
Decentralized IoT environments are subject to consensus building based on the vulnerability for the BG problems. These activities also cyber-attackersâ opportunities for launching random attacks on IoT systems (Kim et al, 2012). These events may be initiated through Wireless Fidelity platforms (Wi-Fi) or dedicated network solutions. Using these devices hackers may be able to attack single/multiple systems (Cyber Resilience, 2016). For example, attackers can indiscriminately modify password characters (Kim et al, 2012). Through this process attackers are often able to crack passwords by randomly generating/sending out encrypted packets, which would flood the entire network (Geer, 2014). After gaining complete access, the attackers may erase/adjust computer logs and thus, exploiting consensus building. Besides, any attacks against single or multiple targeted computers can be launched via a DoS or DDoS (Kim et al, 2012; UDOSA, 2013).
Denial of Service
DoS attacks are a type of cyber-attack making a system unreachable.
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
The Bullet Journal Method by Ryder Carroll(2357)
The 7 Habits of Highly Effective People by Stephen R. Covey & Sean Covey(2073)
The Concise Laws of Human Nature by Robert Greene(1686)
Doesn't Hurt to Ask by Trey Gowdy(1545)
Primal Leadership by Daniel Goleman(1103)
Hook Point: How to Stand Out in a 3-Second World by Brendan Kane(1094)
HBR's 10 Must Reads 2021 by unknow(1039)
Don't Sweat the Small Stuff...and It's All Small Stuff by Richard Carlson(1005)
Amazon Unbound by Brad Stone(968)
100 Things Successful People Do by Nigel Cumberland(958)
HBR's 10 Must Reads 2021 by Harvard Business Review(946)
The Job Closer by Steve Dalton(931)
Master of One by Jordan Raynor(929)
Lives of the Stoics by Ryan Holiday & Stephen Hanselman(894)
Declutter Your Mind: A step by step guide to learn to control your thoughts, stop worrying, relieve anxiety and eliminate panic attacks and negative thinking by Mia Chandler(868)
The Power of 100! by Shaun King(809)
Conflicted by Ian Leslie(787)
Coders at Work: Reflections on the craft of programming by Peter Seibel(779)
The Book of Hope by Jane Goodall(735)
