What is a Honeypot? Honeypots are software designed to detect novel and emerging attack patterns against a specific system. Hence, a vulnerable version of the protected system will be created, which typically represents the easiest way to attack a system. With special preparation, a honeypot serves as a trap that…
For their “The Connected Enterprise: IoT Security Report 2020”, Palo Alto Networks surveyed 1,350 IT decision-makers globally to get insight into business IoT security practices. The survey results show that while most IT decision-makers (95%) are confident that they have visibility of all the IoT devices on their organizations’ networks,…
Welcome to the first edition of the IoTAC Newsletter! If you would like to read about our project and what we have achieved during the first six months, download the Newsletter: Sign up for the IoTAC Newsletter! Stay in the know and receive all the latest updates straight to your…
IoTACMarch 19, 2021
In recent years the rapid proliferation of Internet-connected devices is driving an unprecedented growth of Internet of Things (IoT) systems and applications. This enables the evolving of the functionalities that they provide to end-users, but also in terms of the technologies that they comprise. Specifically, non-trivial state-of-the-art IoT systems comprise…
Netcompany-IntrasoftMarch 11, 2021
The Internet has been steadily growing since its birth back in the second half of the last century. This constant growth was driven by different trends in different epochs. The most recent trend is to connect all sorts of embedded devices to the Internet, including home entertainment systems, industry equipment,…
Levente Buttyán, CrySyS Lab, BMEFebruary 25, 2021
The Internet of things (IoT) is changing the world right before our very eyes. It can make it safer and more convenient, help conserve resources and efficiently manage entire production lines. The IoT concept encompasses an enormous amount of devices, technologies, software, and data transmission protocols. However, the diversity of…
KasperskyFebruary 11, 2021
According to a large number of research papers, legacy access control systems cannot adequately support IoT requirements. Solutions like Identity Based Access Control (IBAC), Role-Based Access Control (RBAC), Attribute-Based Access Control (ABAC), Trust-Based Access Control (TBAC), just to mention the best-known ones, fall short of providing the necessary functionality and…
Andras VilmosJanuary 15, 2021
Recent Comments