SACM - United Kingdom
Permanent URI for this collectionhttps://drepo.sdl.edu.sa/handle/20.500.14154/9667
Browse
2 results
Search Results
Item Restricted Assessing and Enhancing Protection Measures for Internet of Things (IoT) in Cybersecurity(University of Portsmouth, 2024-09) Alshehri, Abdulrahman; Bader-El-den, MohammedThe Internet of Things (IoT) revolution sweeps across Saudi Arabia, connecting devices, transforming industries, enhancing lives. But with great connectivity comes great vulnerability - cybersecurity threats loom large in this digital frontier. This study delves into the heart of IoT security in the Kingdom, surveying the landscape, probing the defenses, seeking solutions. Through the lens of cybersecurity professionals, we explore current practices, uncover challenges, envision improvements. Our findings paint a picture of a nation at a crossroads: frequent audits needed, authentication protocols lacking, employee training insufficient, encryption underutilized. Yet hope springs eternal in the form of correlations discovered - more vigilant monitoring begets stronger authentication desires. From this research emerges a roadmap for the future: recommendations for policymakers to craft robust regulations, guidelines for organizations to fortify their digital fortresses, advice for end-users to navigate the IoT maze safely. In the rapidly evolving technological tapestry of Saudi Arabia, this study weaves a thread of security consciousness, contributing to a safer, more reliable IoT ecosystem. As the Kingdom marches towards its Vision 2030, may it do so with cybersecurity as its steadfast companion.20 0Item Restricted IoT: current challenges and future applications(Saudi Digital Library, 2023-08-30) Almutairi, Nader; Palego, CristianoThis master's thesis explores the dynamic landscape of Internet of Things (IoT) technology, focusing on its transformative potential and obstacles. The study explores the role of IoT devices in reshaping industries, enhancing efficiency, and enhancing resource management by navigating the complex web of IoT devices. The investigation identifies key contributors to the prevalent security vulnerabilities in IoT systems and suggests strategies to strengthen their defences. The research creates a comprehensive framework that combines encryption, authentication, and anomaly detection mechanisms to address the pressing need for secure and efficient IoT solutions. Utilising cutting-edge technologies such as machine learning and blockchain, the framework not only improves the security of IoT devices, but also guarantees data integrity and user privacy. This solution's significance rests in its capacity to pave the way for safer and more reliable IoT technology, thereby nurturing confidence among users, industries, and policymakers. The results of the study demonstrate the effectiveness of the proposed framework in protecting IoT ecosystems from cyber threats, while also addressing ethical and regulatory concerns. Beyond technology, this research has implications for societal well-being, sustainable practises, and economic growth. By mitigating the security risks associated with the Internet of Things, this study establishes the foundation for realising the maximum potential of IoT technology in various industries.50 0