Powered by OpenAIRE graph
Found an issue? Give us feedback
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/ TECHNICAL SCIENCES A...arrow_drop_down
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/
addClaim

This Research product is the result of merged Research products in OpenAIRE.

You have already added 0 works in your ORCID record related to the merged Research product.

Audit of IoT networks: assessing vulnerabilities and protecting against cyber attacks

Audit of IoT networks: assessing vulnerabilities and protecting against cyber attacks

Abstract

This article addresses current challenges in ensuring security within the Internet of Things (IoT) networks, taking into account the modern challenges of the digital transformation era. The key risks associated with the use of IoT devices are outlined: the limitations of built-in security mechanisms, the lack of unified standards, hardware resource constraints, and the complexity of managing heterogeneous environments. Special attention is given to the role of security auditing as a tool for identifying vulnerabilities, assessing risks, and developing strategies to counter cyber threats. Existing auditing approaches, including reactive (retroactive), proactive, and incremental methods, are analyzed in the context of IoT environments. A comparative analysis of IoT system architectures—centralized, decentralized, and hybrid—is provided, highlighting their impact on security. A test model of an IoT network is proposed for practical threat modeling and auditing procedure verification. The article also focuses on modern risk management methodologies, including: ISO/IEC 27005, NIST RMF, OCTAVE, EBIOS, FAIR, COBIT, and CRAMM. The advantages and disadvantages of each are discussed in the context of IoT, emphasizing the suitability of the EBIOS methodology as the most adaptable for complex hybrid systems. The article also stresses the need for the improvement of security policies, adaptation of standards, and the development of auditing procedures that address both technical and organizational aspects of IoT operations. The main goal is to contribute to the creation of a reliable, scalable, and threat-resistant IoT ecosystem.

У статті представлено результати дослідження питань безпеки Інтернету речей (IoT), аналізу ризиків та проведенню аудиту IoT-систем. Розглянуто ризики, пов’язані з використанням IoT-пристроїв, які виникають через недостатній рівень безпеки, відсутність єдиних стандартів та складність управління великими мережами. Особлива увага приділяється аудиту IoT-систем, який дозволяє ідентифікувати слабкі місця в інфраструктурі та мінімізувати можливі загрози. У статті запропоновано різні підходи до аудиту, зокрема проактивний, який спрямований на запобігання ризикам ще на етапі розробки та впровадження системи. Також проаналізовано можливі архітектури IoT (централізовані, децентралізовані, гібридні) та їхній вплив на загальну безпеку системи. Особлива увага приділена методології управління ризиками, яка може бути адаптована до потреб IoT. У статті наведено рекомендації щодо впровадження більш ефективних методів захисту, розробки нових стандартів та комплексного підходу до безпеки IoT-систем. Основна мета – створення надійної, безпечної та масштабованої екосистеми IoT, яка відповідає сучасним викликам.

Keywords

Інтернет речей; безпека IoT; IT аудит систем; управління ризиками; архітектура IoT; захист даних; кіберзагрози, стандарти безпеки; вразливості мереж; протидія атакам; моніторинг; кібербезпека; проактивні методи, Internet of Things; IoT security; IT systems audit; risk management; IoT architecture; data protection; cyber threats; security standards; network vulnerabilities; attack counteraction; monitoring; cybersecurity; proactive methods

  • BIP!
    Impact byBIP!
    selected citations
    These citations are derived from selected sources.
    This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    0
    popularity
    This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
    Average
    influence
    This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    Average
    impulse
    This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
    Average
Powered by OpenAIRE graph
Found an issue? Give us feedback
selected citations
These citations are derived from selected sources.
This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Citations provided by BIP!
popularity
This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
BIP!Popularity provided by BIP!
influence
This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Influence provided by BIP!
impulse
This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
BIP!Impulse provided by BIP!
0
Average
Average
Average
gold