Home / Papers / Internet of things (IoT), personal and material security

Internet of things (IoT), personal and material security

1 Citations2016
D. Stevanović, D. Djurdjević
journal unavailable

This article starts from the presumption that multiplication of censors and users, which is integral to development of the Internet of things, includes the proportional rise in number of points for possible intrusion into systems, and suggests a state can point out to certain characteristics and aid promotion of trust and transparency in the implementation of new technologies.

Abstract

Cyber attack, as the use of computer technologies for illegal purposes, encompasses many modalities: spreading harmful viruses, causing network system failures, destruction of data, gathering classified or private information, spreading disinformation, disrupting processes of management, surveillance, control, transfer of data, navigation, logistic support or operations. All of them, from the functional aspect, have a common modus operandi in form of intrusion into a system for the purpose of unauthorized access and/or stealing data. This article starts from the presumption that multiplication of censors and users, which is integral to development of the Internet of things, includes the proportional rise in number of points for possible intrusion into systems. Since the computer protection systems are digital, and thus also exposed to the risk of attack, computer security presents a challenge for achieving an internal dimension of security. Arranging the Internet on a national level, with a goal to protect the users, is a factor of the fight against crime, and consequently of improving the quality of life. The principle problem arises from the fact that the range of national law ends with borders, and no state has exclusive control over the Internet. Despite that, the way that will establish the confidence of citizens in practice depends on the legal arrangement of national cyberspace. For this purpose, a state, as one of the largest consumers and investors, can point out to certain characteristics and in this way aid promotion of trust and transparency, instead of uncertainty, in the implementation of new technologies.