You are here: Home Contents V10 N3 V10N3_Mahal.html
Personal tools

Cellphones and The Internet of Things — Industry Report

 

 

Full text
View
Purchase

Source
Journal of Information System Security
Volume 10, Number 3 (201)
Pages 4753
ISSN 1551-0123
Authors
Navika Mahal — Carnegie Mellon University, USA
Publisher
Information Institute Publishing, Washington DC, USA

 

 

Abstract

Throughout this paper we explore how our cell phones make us susceptible to various breaches, as well as to security attacks, and the ways in which we can secure ourselves from potential attacks. Moreover, we discuss the Internet of Things (IoT), explaining how it is ubiquitous in society today, and why it is going to become an ever-pertinent issue in the future. The IoT is present in our everyday lives through technological infrastructure, and it runs our daily lives through our cell phones. Because of this, we need to create ways to ensure that these devices are secure from attack. Furthermore, numerous vulnerabilities are associated with the Internet of Things. One of these vulnerabilities is that “hackers and malicious users can access the IoT to launch vicious service attacks” (Fitton, 2010). We face this threat in our day-to-day lives when we use insecure software. However, we continue to use such software because it aids us to maximize utility. Software can only be tested for security to a certain extent, and after that we (as computer scientists?) are not able to do anymore to ensure that software is capable of being secure to breaches. We have provided three potential solutions to our problem in this paper: 1) Strict enforcement of the need-to-know law; 2) Better training of individuals on how to secure their personal information and cell phones; and 3) Providing a standard of behavior for technology and mobile technology.

 

 

Keywords

Cell Phones, The Internet of Things, Technological Infrastructures, Vulnerability, Software

 

 

References

Ebert, J. D. (2011). The New Media Invasion: Digital Technologies and the World they Unmake, McFarland & Co., Inc., Jefferson, N.C.

Fitton, D., Kortuem, G. Kawsar, F. and Sundramoorthy, V. (2010). Smart Objects as Building Blocks for the Internet of Things. IEEE Xplore. IEEE Computer Society.

Gandhi, A. (2014). Wearables in the Enterprise: Beyond Fitness Bands. Forbes Magazine, 23 Oct. 2014.

Kipper, G. (2007). Wireless Crime and Forensic Investigation. Auerbach Publications, Boca Raton, FL.

Maulik, S. (2014). Trends in Infrastructure: The Internet of Things. Profit, Oracle, Jan. 2014.

Perez, S. (2014). Mobile Phones Will Serve as Central Hub to the "Internet of Things"’, readwrite.com, 6 Feb. 2011.

Rice, D. (2008). Geekonomics: The Real Cost of Insecure Software, Addison-Wesley, Upper Saddle River, NJ.

Seddon, M. (2014). Does this Soldier's Instagram account prove Russia is covertly operating In Ukraine? buzzfeed.com, 23 Nov. 2014.