Inicio  /  Informatics  /  Vol: 6 Par: 1 (2019)  /  Artículo
ARTÍCULO
TITULO

Evaluating Awareness and Perception of Botnet Activity within Consumer Internet-of-Things (IoT) Networks

Christopher D. McDermott    
John P. Isaacs and Andrei V. Petrovski    

Resumen

The growth of the Internet of Things (IoT), and demand for low-cost, easy-to-deploy devices, has led to the production of swathes of insecure Internet-connected devices. Many can be exploited and leveraged to perform large-scale attacks on the Internet, such as those seen by the Mirai botnet. This paper presents a cross-sectional study of how users value and perceive security and privacy in smart devices found within the IoT. It analyzes user requirements from IoT devices, and the importance placed upon security and privacy. An experimental setup was used to assess user ability to detect threats, in the context of technical knowledge and experience. It clearly demonstrated that without any clear signs when an IoT device was infected, it was very difficult for consumers to detect and be situationally aware of threats exploiting home networks. It also demonstrated that without adequate presentation of data to users, there is no clear correlation between level of technical knowledge and ability to detect infected devices.

 Artículos similares

       
 
Fridolin Wild, Lawrence Marshall, Jay Bernard, Eric White and John Twycross    
The integration of augmented reality (AR) technology into personal computing is happening fast, and augmented workplaces for professionals in areas such as Industry 4.0 or digital health can reasonably be expected to form liminal zones that push the boun... ver más
Revista: Information

 
Ioannis Drivas, Dimitrios Kouis, Daphne Kyriaki-Manessi and Georgios Giannakopoulos    
While digitalization of cultural organizations is in full swing and growth, it is common knowledge that websites can be used as a beacon to expand the awareness and consideration of their services on the Web. Nevertheless, recent research results indicat... ver más
Revista: Information

 
Moses Moyo and Marianne Loock    
The purpose of this study was to investigate security evaluation practices among small and medium enterprises (SMEs) in small South African towns when adopting cloud business intelligence (Cloud BI). The study employed a quantitative design in which 57 S... ver más
Revista: Information

 
Dania Aljeaid, Amal Alzhrani, Mona Alrougi and Oroob Almalki    
Phishing attacks are cybersecurity threats that have become increasingly sophisticated. Phishing is a cyberattack that can be carried out using various approaches and techniques. Usually, an attacker uses trickery as well as fraudulent and disguised mean... ver más
Revista: Information

 
Katerina Charalambous, Adriana Bruggeman, Elias Giannakis and Christos Zoumides    
Public participation is integrated in the European Floods Directive to ensure engagement of societal actors in selecting and accepting measures. This study assesses the Directive?s public participation process and provides recommendations for its improve... ver más
Revista: Water