Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Study on Cyber Security and Privacy for Big Data in Internet of Things


Affiliations
1 Center for Cyber and Information Security, Norwegian University of Science and Technology, Gjøvik, Norway
     

   Subscribe/Renew Journal


The Internet of Things (IoT) and giant units of information domains have long been plagued by the technology world and are no longer “essential” technologies, but essential. Users without physical access to the computer can copy data directly from the computer. It can also compromise your security by modifying your operating system, installing software worms, keyloggers, listening secretly, or using wireless microphones. Even if your system is protected by standard security measures, you can bypass these measures by booting another operating system or tool from a CD-ROM or other bootable media. Disk Encryption and Trusted Platform module are designed to prevent these attacks.
User
Subscription Login to verify subscription
Notifications
Font Size

Abstract Views: 141

PDF Views: 1




  • Study on Cyber Security and Privacy for Big Data in Internet of Things

Abstract Views: 141  |  PDF Views: 1

Authors

M. Pilkington
Center for Cyber and Information Security, Norwegian University of Science and Technology, Gjøvik, Norway
H. LeHong
Center for Cyber and Information Security, Norwegian University of Science and Technology, Gjøvik, Norway
G. Morabito
Center for Cyber and Information Security, Norwegian University of Science and Technology, Gjøvik, Norway

Abstract


The Internet of Things (IoT) and giant units of information domains have long been plagued by the technology world and are no longer “essential” technologies, but essential. Users without physical access to the computer can copy data directly from the computer. It can also compromise your security by modifying your operating system, installing software worms, keyloggers, listening secretly, or using wireless microphones. Even if your system is protected by standard security measures, you can bypass these measures by booting another operating system or tool from a CD-ROM or other bootable media. Disk Encryption and Trusted Platform module are designed to prevent these attacks.