SAFEGUARDING CONSUMER IOT PRODUCTS: exploring vulnerabilities and cybersecurity solutions.
Owoade, Feyisara Tomilola (2024)
Owoade, Feyisara Tomilola
2024
All rights reserved. This publication is copyrighted. You may download, display and print it for Your own personal use. Commercial use is prohibited.
Julkaisun pysyvä osoite on
https://urn.fi/URN:NBN:fi:amk-2024060420683
https://urn.fi/URN:NBN:fi:amk-2024060420683
Tiivistelmä
Consumer Internet of Things (CIoT) devices are vulnerable to authentication and authorization, network connectivity, software security, and data protection issues. The study examined safeguarding consumer IoT products: exploring vulnerability and cybersecurity solutions. It examined the security concerns that exist in several tiers of the IoT stack, demonstrating how these weaknesses can be manipulated to launch attacks on IoT devices.
Furthermore, the thesis examined the application of encryption, access control mechanisms, secure boot technology, intrusion detection systems, and patch management strategies to enhance the security posture of IoT devices.
Through comprehensive vulnerability assessment and penetration testing methodologies using Metasploit as one of the tools in Kali Linux, the study uncovered common security flaws and weaknesses in consumer IoT products, ranging from software vulnerabilities to configuration errors and design flaws.
From the findings of the study, it is recommended that safeguarding consumer IoT products will contribute to the development of effective cyber security strategies and best practices for securing IoT devices, ultimately with the aim of fostering a safer and more resilient IoT ecosystem for consumers.
Furthermore, the thesis examined the application of encryption, access control mechanisms, secure boot technology, intrusion detection systems, and patch management strategies to enhance the security posture of IoT devices.
Through comprehensive vulnerability assessment and penetration testing methodologies using Metasploit as one of the tools in Kali Linux, the study uncovered common security flaws and weaknesses in consumer IoT products, ranging from software vulnerabilities to configuration errors and design flaws.
From the findings of the study, it is recommended that safeguarding consumer IoT products will contribute to the development of effective cyber security strategies and best practices for securing IoT devices, ultimately with the aim of fostering a safer and more resilient IoT ecosystem for consumers.