Critical Analysis of Data Privacy and Security on IoT Devices in An Organization
- 1. Department of Computer Science, Ebonyi State University, Abakaliki Nigeria.
- 2. Department of Computer Science, Ebonyi State University, Abakaliki Nigeria.
Contributors
Contact person:
- 1. Department of Computer Science, Ebonyi State University, Abakaliki Nigeria.
Description
Abstract: Everyone is trying to catch up with the changing technology world of our time. Every object has been computerized to achieve precision and accuracy in service delivery, reduce cost and eliminate error or reduced it to the barest minimum. The advent of telecommunication and inroad into the computer world has opened the space to get every object behave on predefined set of rules. Items ranging from household object to service and manufacturing material have all been programmed to understand and act digitally. The paper x-rayed the uses, challenges and breaches caused by IoT devicesin organizations. This paper took a critical study of the data privacy and security as it relates to IoT devices in an organization. It also enlightens users on the breaches caused by these devices and dangers of these breach on the organizational data security. In order to build a trust in the system, the researcher proffered ways of securing data in IoT devices in organizations to achieve maximum and needed security.
Notes
Files
K928610111122.pdf
Files
(296.9 kB)
Name | Size | Download all |
---|---|---|
md5:6aaa9c778167fd28237af4676bc00e75
|
296.9 kB | Preview Download |
Additional details
Related works
- Is cited by
- Journal article: 2278-3075 (ISSN)
References
- NDPR (2019) Nigeria Data Protection Act NDPR.http://www.dataguidance.com
- S. Von Solms, (2000) "Information security—the third wave?," Comput.Secur., vol. 19, no. 7, pp. 615–620, 2000.
- K. Thomson, R. Von Solms, and L. Louw, "Cultivating an organizational information security culture," Comput. Fraud Security, no. 10, pp. 7–11, 2006.
- National Privacy Commission (2012) https://en.wikipedia.org/wiki/National_Privacy_Commission_(2019)
- https://www.securitymagazine.com/ (2021) People Risk Management and the Journey to Agile Operational Resiliency retried July 3, 2022
- Fergus U Onu, Ikechukwu J, Ezea (2022)Critical Analysis Of The Vulnerabilities Surrounding The Use Of POS Services In Rural Nigerian Communities, Published by Blue Eyes Intelligence Engineering and Science, June 2022, ISSN 2394-0913
- Mohammed Mane (2020) How Ihebuzor Chris, Access Bank Hacker Was Arrested by EFCC https://www.techawkng.com/2020/09/12/howihebuzor-chris-access-bank-hacker-was-arrested-by-efcc/ Lago
- The Guaridian Newspaper: Man hacks into Nigeria Bank's System steal N1.87b, Published on August 13, 2021,Lagos Nigeria,
- MouradeAzrour, Jamal Mabrouki, AzidineGuezzaz, AmbrinaKanwal,(2021)"Internet of Things Security: Challenges and Key Issues", Security and Communication Networks, vol. 2021, ArticleID 5533843, 11 pages, . https://doi.org/10. 1155/2021/5533843
- Aldossary, S. & Allen, W. (2016). Data Security, Privacy, Availability and Integrity in Cloud Computing: Issues and Current Solutions. International Journal of Advanced Computer Science and Applications. 7. 10.14569/IJACSA.2016.070464.
- Katrenko A and Semeniak E (2021) Internet of Things (IoT) Security: Challenges and Best Practices It was originally publishedonhttps://www.apriorit.com/
- Atoui R. (2018) The Importance of Security by Design for IoT Devices
- https://www.primefactors.com/data-protection/ July 2022
- Dawn M. Turner (2016: What is Key Management? a CISO Perspective https://www.cryptomathic.com Feb, 21, 2016, retrieved July 3 , 2022
Subjects
- ISSN: 2278-3075 (Online)
- https://portal.issn.org/resource/ISSN/2278-3075#
- Retrieval Number: 100.1/ijitee.K928610111122
- https://www.ijitee.org/portfolio-item/k928610111122/
- Journal Website: www.ijitee.org
- https://www.ijitee.org/
- Publisher: Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP)
- https://www.blueeyesintelligence.org/