Internet of Things System Penetration Threats
Internet of Things System Penetration Threats Table of Contents CHAPTER 1: INTRODUCTION .. 3 1.1 Background of the Problem .. 3 1.2 Problem Statement . 5 1.3 Objectives . 6 1.3.1 Specific objectives . 6 1.4 Importance of the Study . 6 1.5 Scope of the Study . 7 1.6 Definition of Terms . 7 1.7 Chapter Summary . 8 References . 9 CHAPTER 1: INTRODUCTION This section introduces the Internet of Things and vulnerabilities in intelligent objects or IoT devices. In the global era, the Internet of Things is the most present technology that allows physical objects to communicate with one another via software and networking networks. The rapid growth and adaptability of the Internet of Things have led to the exposure of cybercrimes and weaknesses to IoT objects and devices. In addressing threats a...