Explore chapters and articles related to this topic
Home Automation in Cloud-Based IoT
Published in Fadi Al-Turjman, The Cloud in IoT-enabled Spaces, 2019
Fadi Al-Turjman, Mohamad Sanwal
Password protection: In this modern era, almost every manufacturing company supports the password protection of devices. Along with the password protection, it is very important to check that the specific device supports the changing of password. Some of the companies do not allow to change the default password, which deceases the security and increases the vulnerability of the device.
The evolving landscape of technology-dependent crime
Published in M. R. McGuire, Thomas J. Holt, The Routledge Handbook of Technology, Crime and Justice, 2017
At the time of writing we would appear to be standing on the brink of a new era of problems thanks to the emergence of the Internet of Things and a whole new landscape of online devices. Our drive for technological innovation appears to show a remarkable capacity for ignoring the security lessons of the past. In this respect, the IoT is following the well-trodden path of PCs, wireless networking, mobile devices, with all the attention going towards innovating and deploying the technology, while the risks are given little or no consideration. As such, the devices have significant potential to further increase the breadth of exploitable technologies – and to do so on a large scale. As an example, one can now readily purchase IP-enabled surveillance cameras, promoted as a solution for home security and remote monitoring of other premises. However, many such systems are used with default passwords, meaning that anyone willing to do a tiny bit of research to find out what the default is can tap into the device and watch the video that is being captured (NetworkWorld 2014). It is, of course, somewhat ironic that devices specifically installed to improve security in the physical world should find themselves fundamentally vulnerable to being exploited on the cyber side. However, the same problem has previously been seen with unsecured wireless access points, with devices shipped without security enabled and with default passwords to administer them, and so it is not hard to foresee that a similar potential for misuse would exist here.
Towards a role-based authentication system based on SSVEP-P300 hybrid brain–computer interfacing
Published in Behaviour & Information Technology, 2022
Nikhil Rathi, Rajesh Singla, Sheela Tiwari
Authentication is a process of identifying claimed user identity by validating the evidence presented by the user as a basic requirement to approve access to system resources (Bhattacharyya et al. 2009; Tellabi et al. 2018). Access control, on the other hand, implies that the user’s authentication has been successfully checked before access control compliance. An organisation’s authentication systems are typically based on standard password schemes. The passwords used are often the default passwords set by the manufacturer, easy to guess or predict, posing additional security risks. Therefore, organisations need effective authentication systems to protect their assets from threats.