A Discussion of Malware Attacks Targeting Smart Homes and Connected Devices: Investigating Cybersecurity Risks in Everyday Living
Keywords:malware, Iot, smart home devices
Computer technology has advanced with the digital age. Software for several platforms is crucial to streamlining human work with computers. This software is essential for many user tasks, including IoT ones. Through data exploitation and communication technologies, the Internet of entities (IoT) connects physical and virtual entities to the global web. This technology aims to make it easier for humans to interact with objects and let them communicate. In daily life, numerous specialized gadgets use the Internet of Things (IoT), especially Smart Homes. Smart Homes integrate networked communication networks with home devices for remote control, monitoring, and access. The name "Smart" in Smart Homes suggests intelligence, however IoT devices have limitations. Malware is purposely designed to disrupt or gain unauthorized access to computer systems without the system owner's knowledge or agreement. Malware threatens smart home security widely. Malware can also quickly regenerate and adapt as technology advances. It's often integrated into popular online apps. This study examines how malware assaults affect IoT and Smart Home devices. The study's conclusions include an analytical report on IoT and Smart Home malware mitigation in legal perspectives.
Aboaoja, Faitouri A., Anazida Zainal, Fuad A. Ghaleb, Bander Ali Saleh Al-rimy, Taiseer Abdalla Elfadil Eisa, and Asma Abbas Hassan Elnour. “Malware Detection Issues, Challenges, and Future Directions: A Survey.” Applied Sciences (Switzerland). MDPI, September 1, 2022. https://doi.org/10.3390/app12178482.
Anna, Zharova, and Elin Vladimir. “State Regulation of the IoT in the Russian Federation: Fundamentals and Challenges.” International Journal of Electrical and Computer Engineering 11, no. 5 (October 1, 2021): 4542–49. https://doi.org/10.11591/ijece.v11i5.pp4542-4549.
Bruzgiene, Rasa, and Konstantinas Jurgilas. “Securing Remote Access to Information Systems of Critical Infrastructure Using Two-Factor Authentication.” Electronics (Switzerland) 10, no. 15 (2021). https://doi.org/10.3390/electronics10151819.
Eian, Isaac Chin, Lim Ka Yong, Majesty Yeap Xiao Li, Yeo Hui Qi, and Zahra Fatima. “Cyber Attacks in the Era of Covid-19 and Possible Solution Domains.” Preprints 2020, no. September (2020).
GDPR, EU. “GDPR Portal?: Site Overview,” 2018. https://www.eugdpr.org/.
Ghosh, Arka, David John Edwards, and M. Reza Hosseini. “Patterns and Trends in Internet of Things (IoT) Research: Future Applications in the Construction Industry.” Engineering, Construction and Architectural Management. Emerald Group Holdings Ltd., February 15, 2021. https://doi.org/10.1108/ECAM-04-2020-0271.
Hou, Jianwei, Leilei Qu, and Wenchang Shi. “A Survey on Internet of Things Security from Data Perspectives.” Computer Networks 148 (January 15, 2019): 295–306. https://doi.org/10.1016/j.comnet.2018.11.026.
Jindal, Falguni, Rishabh Jamar, and Prathamesh Churi. “Future and Challenges of Internet of Things.” International Journal of Computer Science and Information Technology 10, no. 2 (April 30, 2018): 13–25. https://doi.org/10.5121/ijcsit.2018.10202.
Lindqvist, Jenna. “New Challenges to Personal Data Processing Agreements: Is the GDPR Fit to Deal with Contract, Accountability and Liability in a World of the Internet of Things?” International Journal of Law and Information Technology 26, no. 1 (March 1, 2018): 45–63. https://doi.org/10.1093/ijlit/eax024.
Macedo, Evandro L.C., Egberto A.R. De Oliveira, Fabio H. Silva, Rui R. Mello, Felipe M.G. Franca, Flavia C. Delicato, Jose F. De Rezende, and Luis F.M. De Moraes. “On the Security Aspects of Internet of Things: A Systematic Literature Review.” Journal of Communications and Networks. Korean Institute of Communication Sciences, October 1, 2019. https://doi.org/10.1109/JCN.2019.000048.
Mccoy, Andrew P, and Armin Yeganeh. “An Overview of Emerging Construction Technologies.” NAIOP Research Foundation, 2021, 1–45. https://www.researchgate.net/publication/350975155.
Ningsih, Ayup Suran. “The Doctrine of Product Liability and Negligence Cannot Be Applied to Malware-Embedded Software.” Journal of Indonesian Legal Studies 4, no. 1 (May 1, 2019): 7–20. https://doi.org/10.15294/jils.v4i01.29157.
Park, Minjung, and Sangmi Chai. “Ai Model for Predicting Legal Judgments to Improve Accuracy and Explainability of Online Privacy Invasion Cases.” Applied Sciences (Switzerland) 11, no. 23 (December 1, 2021). https://doi.org/10.3390/app112311080.
Piasecki, Stanislaw, Lachlan Urquhart, and Professor Derek McAuley. “Defence against the Dark Artefacts: Smart Home Cybercrimes and Cybersecurity Standards.” Computer Law and Security Review 42 (September 1, 2021). https://doi.org/10.1016/j.clsr.2021.105542.
Rachmadie, Donovan Typhano, and ’ Supanto. “REGULASI PENYIMPANGAN ARTIFICIAL INTELLIGENCE PADA TINDAK PIDANA MALWARE BERDASARKAN UNDANG-UDANG REPUBLIK INDONESIA NOMOR 19 TAHUN 2016.” Recidive?: Jurnal Hukum Pidana Dan Penanggulangan Kejahatan 9, no. 2 (May 2, 2020): 128. https://doi.org/10.20961/recidive.v9i2.47400.
Sereda, Bohdana, and Jason Jaskolka. “An Evaluation of IoT Security Guidance Documents: A Shared Responsibility Perspective.” In Procedia Computer Science, 201:281–88. Elsevier B.V., 2022. https://doi.org/10.1016/j.procs.2022.03.038.
Watson, Ashleigh. “Methods Braiding: A Technique for Arts-Based and Mixed-Methods Research.” Sociological Research Online 25, no. 1 (2020). https://doi.org/10.1177/1360780419849437.
Zubaydi, Haider Dhia, Pál Varga, and Sándor Molnár. “Leveraging Blockchain Technology for Ensuring Security and Privacy Aspects in Internet of Things: A Systematic Literature Review.” Sensors. MDPI, January 1, 2023. https://doi.org/10.3390/s23020788.
How to Cite
Copyright (c) 2023 Journal of Digital Law and Policy
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.