Affiliation:
1. Shambhunath Institute of Engineering and Technology, India
2. Kamla Nehru Institute of Technology, Sultanpur, India
Abstract
The primary driver of this expansion is the internet user, who is expected to connect 64 billion devices worldwide by 2026. Nearly $20 trillion will be spent on IoT devices, services, and infrastructure, according to Business Insider. Many cybercrimes and vulnerabilities related to cybercrime are committed with the use of data. Asset management, fitness tracking, and smart cities and homes are examples of internet security applications. The average person will most likely own two to six connected internet security devices by the end of the year, a significant increase over the total number of cell phones, desktop computers, and tablets. Although data provides a plethora of opportunities for its users, some have taken advantage of these advantages for illegal purposes. In particular, a great deal of cybercrime is made possible by the gathering, storing, analyzing, and sharing of data as well as the widespread gathering, storing, and distribution of data without the users' knowledge or consent and without the required security and legal protections. Furthermore, because data gathering, analysis, and transfer happen at scales that governments and organisations are unprepared for, there are a plethora of cybersecurity threats. Protection, privacy, and system and network security are all related.
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Scouting the Juncture of Internet of Things (IoT), Deep Learning, and Cybercrime;Advances in Digital Crime, Forensics, and Cyber Terrorism;2024-09-13
2. Harnessing Machine Learning Intelligence Against Cyber Threats;Advances in Business Strategy and Competitive Advantage;2024-08-28
3. Safeguarding Identities with GAN-based Face Anonymization;Engineering, Technology & Applied Science Research;2024-08-02