Affiliation:
1. University of Missouri – St. Louis, USA
Abstract
Secure computing is essential as environments continue to become intertwined and hyperconnected. As the Internet of Things (IoT), Web of Things (WoT), and the Internet of Everything (IoE) dominate the landscape of technological platforms, protection these complicated networks is important. The everyday person who wishes to have more devices that allow the ability to be connected needs to be aware of what threats they could be potentially exposing themselves to. Additionally, for the unknowing consumer of everyday products needs to be aware of what it means to have sensors, Radio Frequency IDentification (RFID), Bluetooth, and WiFi enabled products. This submission explores how Availability, Integrity, and Confidentiality (AIC) can be applied to IoT, WoT, and IoE with consideration for the application of these architectures in the defense sector.
Reference25 articles.
1. Using extended file information (EXIF) file headers in digital evidence analysis.;P.Alvarez;International Journal of Digital Evidence,2004
2. Bradley, J., Barbier, J., & Handler, D. (2013). Embracing the Internet of everything to capture your share of $14.4 trillion. White Paper, Cisco.
3. A Brief Review of New Threats and Countermeasures in Digital Crime and Cyber Terrorism
4. Understanding the Methods behind Cyber Terrorism
5. The Future of National and International Security on the Internet
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献