The number of Internet of Things (IoT) applications has greatly increased during the last two decades. Globally, more than half a billion electronic devices are connected. Due to their constant connection to the Internet, IoT applications are frequently targeted by a wide range of conventional threats, such as Trojan horses, worms, malware, spyware, and malicious code injections. It is apparent that traditional threats offer services like accountability, authorization, authentication, and these factors are typically used to identify a subject and determine whether the person is qualified to access the object. With the large numbers of connected devices, it is likely that IoT systems may become more vulnerable to threats and attacks with high-frequency electromagnetic radiation and more advanced viruses. Therefore, there is a pressing need to address these privacy and security concerns because it is insufficient to rely on currently used conventional procedures. This study identifies the knowledge and research gaps in this field by exploring the various dangers that IOT devices are vulnerable to, how these dangers operate and create a recovery mechanism to mitigate the harms. The study concludes by suggesting cutting-edge authentication methods like one-time password (OTP) ID- and password-based, three-factor/multi-factor and blockchain. Keywords: Architecture, Authentication, Internet of Things, Privacy, Security Proceedings Citation Format Mosud, Y. O., Ajulo, E.B. & Yinusa, A.B. (2023): Internet of Things (IoT) Security and Private Concerns: An Overview. Proceedings of the Cyber Secure Nigeria Conference. Nigerian Army Resource Centre (NARC) Abuja, Nigeria. 11-12th July, 2023. Pp 49-58 https://cybersecurenigeria.org/conference-proceedings/volume-2-2023/ dx.doi.org/10.22624/AIMS/CSEAN-SMART2023P7