TY - GEN
T1 - Government efforts toward promoting iot security awareness for end users
T2 - 18th European Conference on Cyber Warfare and Security, ECCWS 2019
AU - Kautsarina,
AU - Anggorojati, Bayu
N1 - Publisher Copyright:
© 2019, Curran Associates Inc. All rights reserved.
PY - 2019/1/1
Y1 - 2019/1/1
N2 - Due to the ease and cost of developing IoT devices as well as to the high adoption rate of smart connected things, the IoT ecosystem is expected to grow continually. Some IoT applications are already on the market, such as in a smart home, wearable, connected vehicle, medical and healthcare, smart grids, and so on. However, the increasing use of IoT, especially in the individual domain, causes the opening of security vulnerabilities. Various studies have attempted to identify security issues on IoT. Many studies indicate that data privacy is one of the primary considerations in IoT because of the high possibility of creating security risks, such as unauthorized access, tapping, data modification, data forgery and so on. Some IoT services and applications provide personal and sensitive information openly and can be misused because of the leakage of data to third parties. Several studies state that the enforcement mechanism of IoT is still inadequate. Besides, there are issues such as identification problems, authentication and authorization, and cross-device dependencies. From the various vulnerabilities, threat sources have been identified by previous researchers apart from bad manufacturers and outside parties, namely IoT users themselves as owners of devices that intentionally or unintentionally provide access to sensitive information. From that case, user awareness becomes a critical aspect of the IoT ecosystem. Some countries are known to have prepared themselves with strategies and master plans in dealing with the IoT era. This study seeks to identify what efforts have been made by the government and other stakeholders in promoting IoT security for end-users in various countries and what best practices can be learned from existing initiatives, and what aspects might still need further research.
AB - Due to the ease and cost of developing IoT devices as well as to the high adoption rate of smart connected things, the IoT ecosystem is expected to grow continually. Some IoT applications are already on the market, such as in a smart home, wearable, connected vehicle, medical and healthcare, smart grids, and so on. However, the increasing use of IoT, especially in the individual domain, causes the opening of security vulnerabilities. Various studies have attempted to identify security issues on IoT. Many studies indicate that data privacy is one of the primary considerations in IoT because of the high possibility of creating security risks, such as unauthorized access, tapping, data modification, data forgery and so on. Some IoT services and applications provide personal and sensitive information openly and can be misused because of the leakage of data to third parties. Several studies state that the enforcement mechanism of IoT is still inadequate. Besides, there are issues such as identification problems, authentication and authorization, and cross-device dependencies. From the various vulnerabilities, threat sources have been identified by previous researchers apart from bad manufacturers and outside parties, namely IoT users themselves as owners of devices that intentionally or unintentionally provide access to sensitive information. From that case, user awareness becomes a critical aspect of the IoT ecosystem. Some countries are known to have prepared themselves with strategies and master plans in dealing with the IoT era. This study seeks to identify what efforts have been made by the government and other stakeholders in promoting IoT security for end-users in various countries and what best practices can be learned from existing initiatives, and what aspects might still need further research.
KW - End user
KW - Government efforts
KW - IoT ecosystem
KW - Security awareness
UR - http://www.scopus.com/inward/record.url?scp=85070005231&partnerID=8YFLogxK
M3 - Conference contribution
AN - SCOPUS:85070005231
T3 - European Conference on Information Warfare and Security, ECCWS
SP - 692
EP - 701
BT - Proceedings of the 18th European Conference on Cyber Warfare and Security, ECCWS 2019
A2 - Cruz, Tiago
A2 - Simoes, Paulo
PB - Curran Associates Inc.
Y2 - 4 July 2019 through 5 July 2019
ER -