Data Protection and Recovery Plan for Securing Home IoT Domain

Syed Rizvi, James Davis, Shane Reigert, Mark Ihnat

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

The proliferation of Internet of Things (IoT) devices in residential settings has exposed individuals to increased vulnerabilities. However, the residential environment often lacks sufficient security measures to effectively address these risks. This research aims to explore methods for securing IoT devices in homes by implementing a proposed risk management framework and utilizing the Business Impact Analysis (BIA) to mitigate potential challenges posed by malicious actors. To demonstrate the practical application of the risk management framework and BIA, a hypothetical yet realistic case study of a home network is created. Subsequently, a comprehensive data recovery plan will be developed. By employing this framework, we can effectively address various aspects of the BIA, leading to the formulation of contingency policies and recommendations that establish a resilient IoT network.

Original languageEnglish (US)
Title of host publicationProceedings - 2023 International Conference on Computational Science and Computational Intelligence, CSCI 2023
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages964-970
Number of pages7
ISBN (Electronic)9798350361513
DOIs
StatePublished - 2023
Event2023 International Conference on Computational Science and Computational Intelligence, CSCI 2023 - Las Vegas, United States
Duration: Dec 13 2023Dec 15 2023

Publication series

NameProceedings - 2023 International Conference on Computational Science and Computational Intelligence, CSCI 2023

Conference

Conference2023 International Conference on Computational Science and Computational Intelligence, CSCI 2023
Country/TerritoryUnited States
CityLas Vegas
Period12/13/2312/15/23

All Science Journal Classification (ASJC) codes

  • Artificial Intelligence
  • Computer Science Applications
  • Computational Mathematics

Fingerprint

Dive into the research topics of 'Data Protection and Recovery Plan for Securing Home IoT Domain'. Together they form a unique fingerprint.

Cite this