2021
DOI: 10.47191/ijmcr/v9i5.01
|View full text |Cite
|
Sign up to set email alerts
|

Analysis of IoT security issues used in Higher Education Institutions

Abstract: The holistic analysis conducted in this article aimed to identify vulnerabilities, cyber-attacks and ways to mitigate them in IoT systems, which are increasingly implemented in Higher Education Institutions (HEIs). Industry 4.0 is gaining ground in academia, which governs with a large volume of sensitive data, and the growing use of IoT systems brings a number of undeniable benefits and growing challenges. The creation of smart university campuses, of innovative laboratories that allow the simulation of techno… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0
2

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(7 citation statements)
references
References 20 publications
0
5
0
2
Order By: Relevance
“…The hypothesis is also supported by researchers Thomas Edgar & David Manz, in the book "Research Methods for Cyber Security", who claim that: "Cyber systems would not have a function without human intervention" [4, pp. [33][34][35][36][37][38][39]. Cyber systems are part of cyberspace, they represent the physical manifestations of cyberspace activity, with which humans interact, and cyber security is part of every interaction [4, pp.…”
Section: Cyber Securitymentioning
confidence: 99%
See 1 more Smart Citation
“…The hypothesis is also supported by researchers Thomas Edgar & David Manz, in the book "Research Methods for Cyber Security", who claim that: "Cyber systems would not have a function without human intervention" [4, pp. [33][34][35][36][37][38][39]. Cyber systems are part of cyberspace, they represent the physical manifestations of cyberspace activity, with which humans interact, and cyber security is part of every interaction [4, pp.…”
Section: Cyber Securitymentioning
confidence: 99%
“…Cyber systems are part of cyberspace, they represent the physical manifestations of cyberspace activity, with which humans interact, and cyber security is part of every interaction [4, pp. [33][34][35][36][37][38][39].…”
Section: Cyber Securitymentioning
confidence: 99%
“…Hal ini memudahkan dosen, administrator, dan mahasiswa untuk berkolaborasi tanpa perlu membuat akun baru pada LMS [12] [13]. OAuth 2.0 juga dimanfaatkan untuk mengintegrasikan perangkat IoT pada perguruan tinggi [14], seperti IoT-based Smart classroom, IoT-based Smart lab, dan IoT-based Smart campus [15].…”
Section: Pendahuluanunclassified
“…Perangkat IoT yang digunakan pada perguruan tinggi terus bertambah, karena mobilitas, skalabilitas, dan kemudahan penggunaan. IoT pada sektor akademik diantaranya IoT-based Smart classroom, IoT-based Smart lab, dan IoT-based Smart Campus [15]. Studi kasus kampus digital di Jepang memiliki platform yang terdiri dari tablet PC untuk setiap mahasiswa, akses ke jaringan Wi-Fi, LMS, groupware, SNS, data opensource terbaru, berbagai kursus online gratis yang tersedia secara global, jam tangan, dan kacamata pintar.…”
Section: Implementasi Oauth 20 Pada Perguruan Tinggiunclassified
“…Cyber-attacks have immensely affected higher education institutions during the complete shift to online learning in almost all higher education institutions because of the pandemic restriction measures. Recently, cyber-attacks have been reported in higher education, whereby data of students, faculty and staff were stolen and exploited for illegal purposes (Alexei Arina, 2021; Bolanio et al , 2021).…”
Section: Introductionmentioning
confidence: 99%