6th Sem Seminar Report
6th Sem Seminar Report
6th Sem Seminar Report
I INTRODUCTION 7
II MOTIVATION 10
IV RECENT TRENDS 14
V IOT ATTACKS 16
VII CONCLUSION 20
VIII REFERENCES 23
LIST OF FIGURES
CHAPTER I
INTRODUCTION
What is IOT?
Over the past few years, IoT has become one of the most
important technologies of the 21st century.
CHAPTER II
SRM INSTITUTE OF SCIENCE AND TECHNOLOGY Page 11
Semester VI Information Technology Year: III
MOTIVATION
Cyberattack Motivations
Every year Verizon publishes the highly informative Data Breach
Investigations Report, a compilation of the characteristics and trends
of cyberattacks and threats in the previous year.
In 2018’s edition, the 11th annual, Verizon’s researchers
characterized the motivations of attackers and “threat actors” in these
ways (where the motivations can be discerned):
1. Financial gain is the dominant motivation of attackers.
2. Espionage — such as obtaining corporate or government secrets
for strategic advantage — ranks second highest as a motivation.
Time Series
1999: The term Internet of Things is coined by Kevin Ashton, Executive
Director of the Auto-ID Center in Massachute Institute of Technology
(MIT).
1999: Neil Gershenfeld first time spoken about IoT principles in his
book titled “When Things Start to Think”.
1999: MIT Auto-ID Lab, originally founded by Kevin Ashton, David
Brock and Sanjay Sarma in this year. They helped to develop the
Electronic Product Code.
2000: LG announced its first Internet of refrigerator plans.
2002
: The Ambient Orb created by David Rose and others in a spin-off from
Many IoT devices collect and store valuable data, while also receiving
commands over the IoT network. In order to protect critical data
transferred over the network and thus the applications running on the
device, OPTIGA™ Trust M offers a secured communication feature. It
supports the TLS and DTLS protocols to protect against eavesdropping,
tampering and message forgery.
Summary of Features
CHAPTER V
IOT ATTACKS
IoT devices are particularly vulnerable to network attacks such as data
thefts, phishing attacks, spoofing and denial of service attacks (DDoS
attacks).
These can lead to other cyber security threats like ransomware attacks
and serious data breaches that can take businesses a lot of money and
effort to recover from.
CHAPTER VI
REAL WORLD IOT ATTACKS
3.Cold in Finland
In November 2016, cybercriminals turned off the heating in two
buildings in the Finnish city of Lappeenranta.
5.Stuxnet
Stuxnet is probably the most well-known IoT attack.
Its target was a uranium enrichment plant in Natanz, Iran.
During the attack, the Siemens Step7 software running on
Windows was compromised, giving the worm access to the
industrial program logic controllers.
This allowed the worm's developers to control different
machines at the industrial sites and get access to vital industrial
information.
The first indications of a problem with the nuclear facility's
computer system surfaced in 2010.
When IAEA inspectors visited the Natanz plant, they saw that a
strangely high percentage of uranium enrichment centrifuges
were breaking. Multiple malicious files were later found on
Iranian computer systems in 2010.
It was discovered that the Stuxnet worm was included in these
malicious files.
Iran hasn't provided detailed information on the attack's results,
but the Stuxnet virus is believed to have damaged 984 uranium-
enrichment centrifuges.
According to estimates, this resulted in a 30% reduction in
enrichment efficiency.
CHAPTER VII
CONCLUSION
2.Add solid passwords - One of the most ideal ways to forestall both
a digital assault is by adding solid and novel passwords for all gadget
accounts, associated gadgets, and WiFi organizations. A solid secret
word will be in excess of ten characters and incorporate a blend of
images, numbers, and capital letters to make it challenging for even a PC
to figure. From that point, multifaceted verification (MFA) can give
extra safety efforts outside of an intricate secret word.
Ensure that the item has no uncovered ports or connectors that are
effectively open to non-workers.
CHAPTER VIII
REFERENCES
Links
1)Reasearch gate -
https://www.researchgate.net/publication/
324149744_A_Comprehensive_IoT_Attacks_Survey_based_on_a_Build
ing-blocked_Reference_Mode
2) IEEE -
https://ieeexplore.ieee.org/document/9343051
3)Science Direct –
https://www.sciencedirect.com/science/article/pii/S2542660522000592
Papers