Page 94 - Cyber Defense eMagazine August 2023
P. 94

The final talk

            Through  this chapter  – we would see how our IoT asset  would get vulnerable to some of the hacker’s
            operations. Unluckily to all of us – many critical infrastructures would belong to IoT capacities and those
            assets  could  get  attacked  so  easily.  In  conclusion,  we  would  want  to  say  that  the  entire  expert’s
            community  should  work  so hard  in order  to prevent  some of  these  incidents  even  happen  as  well  as
            aware people how to help themselves in such a sort of dealing with the threats, risks and challenges.




            References:

            [1]  Djekic,  M.  D.,  2017.  The  Internet  of  Things:  Concept,  Application  and  Security.  LAP  LAMBERT
            Academic Publishing.


            [2] Djekic, M. D., 2021. The Digital Technology Insight. Cyber Security Magazine

            [3] Djekic, M. D., 2021. Smart Technological  Landscape. Cyber Security Magazine

            [4] Djekic, M. D., 2021. Biometrics Cyber Security. Cyber Security Magazine

            [5] Djekic, M. D., 2020. Detecting an Insider Threat. Cyber Security Magazine

            [6] Djekic, M. D., 2021. Communication  Streaming Challenges. Cyber Defense Magazine

            [7] Djekic, M. D., 2021. Channelling as a Challenge. Cyber Defense Magazine

            [8] Djekic, M. D., 2021. Offense Sharing Activities in Criminal Justice Case. Cyber Defense Magazine

            [9] Djekic, M. 2019. The Informant Task. Asia-Pacific Security Magazine

            [10]  Djekic,  M.  D.,  2020.  The  Importance  of  Communication  in  Investigations.  International  Security
            Journal

            [11] Djekic, M. D. 2019. The Purpose of Neural Networks in Cryptography, Cyber Defense Magazine

            [12] Djekic, M. D. 2020. Artificial Intelligence-driven  Situational Awareness, Cyber Defense Magazine

            [13] Djekic, M. D. 2019. The Perspectives of the 5th Industrial Revolution, Cyber Defense Magazine

            [14] Djekic, M. D. 2019. The Email Security Challenges, Cyber Defense Magazine

            [15] Djekic, M. D. 2016. The ESIS Encryption Law, Cyber Defense Magazine

            [16]  Đekić,  M.  D.,  2021.  The  Insider’s  Threats:  Operational,  Tactical  and  Strategic  Perspective.  LAP
            LAMBERT Academic Publishing.










            Cyber Defense eMagazine – August 2023 Edition                                                                                                                                                                                                               94
            Copyright © 2023, Cyber Defense Magazine. All rights reserved worldwide.
   89   90   91   92   93   94   95   96   97   98   99