Abstract

Many devices in the Internet of Things (IoT) ecosystem may be susceptible to cyberattacks due to their diverse nature and lack of standardization. Resource-constrained IoT devices include sensor nodes, smart gadgets, and wearable devices. An organization's RAP (Risk Assessment Process) integrates the evaluation of hazards that are linked to all its resources, as well as the evaluation and prioritization of these risks. It is crucial to begin the risk management process with an accurate and thorough risk assessment. The Cyber Security Risk Models (CSRMs) in Cloud Computing are examined in this research. To understand the uniqueness of IoT systems and why present risk assessment methodologies for IoT are ineffective, it is necessary to understand the current state of risk assessment for IoT. There are constraints to periodic evaluations IoT due to device interoperability. Continuous testing of IoT solutions is thus essential.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call