Posts

Showing posts from May, 2022

Internet of Things System Penetration Threats

                    Internet of Things System Penetration Threats               Table of Contents CHAPTER 1: INTRODUCTION .. 3 1.1 Background of the Problem .. 3 1.2 Problem Statement . 5 1.3 Objectives . 6 1.3.1 Specific objectives . 6 1.4 Importance of the Study . 6 1.5 Scope of the Study . 7 1.6 Definition of Terms . 7 1.7 Chapter Summary . 8 References . 9     CHAPTER 1: INTRODUCTION This section introduces the Internet of Things and vulnerabilities in intelligent objects or IoT devices. In the global era, the Internet of Things is the most present technology that allows physical objects to communicate with one another via software and networking networks. The rapid growth and adaptability of the Internet of Things have led to the exposure of cybercrimes and weaknesses to IoT objects and devices. In addressing threats a...

Cyber security issues affecting the electronic health records: A case study of UK hospitals

                  Cyber security issues affecting the electronic health records: A case study of UK hospitals         Contents CHAPTER 1: INTRODUCTION .. 1 1.1 Background of the study . 1 1.2 Problem Statement 3 1.3 Objectives . 4 1.3.1 Specific Objectives . 4 1.4 Importance of the Study . 4 1.5 Scope of the Study . 5 1.6 Definition of Terms . 5 1.7 Chapter Summary . 6 References . 7   CHAPTER 1: INTRODUCTION In the digital era, the dependency on technology in the health sector has rapidly increased, which has led to the exposure of health data to cyber threats. This chapter introduces the impacts that cyberattacks have on patient and National Health Service hospital data. In expanding to technology that can be implemented to secure information in health facilities, this chapter introduces and addresses the study's background, problem stateme...