Cybersecurity in the Age of the Internet of Things (Threats, Vulnerabilities, Attacks, and Countermeasures): A review
DOI:
https://doi.org/10.29304/jqcsm.2025.17.42555Keywords:
Internet of Things,, Cybersecurity,, Threats, Challenges, Countermeasures.Abstract
The technology of connecting physical objects and devices to the Internet is called the Internet of Things[IoT]. With this technology, it has become possible to live within a smart environment that provides users with comfort, entertainment, and ease of doing business in various fields, including industry, medicine, energy, and even urban settings. Although this technology is a breakthrough in the field of communication and data exchange, it is not isolated from the challenges of cybersecurity. It is necessary to not forget that everything connected to the internet is vulnerable to hacking. Therefore, it is essential to rely on cybersecurity technologies and apply them to IoT systems to protect infrastructure and sensitive data from hacking. It's important to note that traditional security measures don't work effectively with IoT systems. Therefore, such systems require highly accurate and efficient protection systems, as security risks can put companies, governments, and even individuals at risk. Therefore, it's essential to develop strategies to combat cybersecurity crimes. To understand the most important challenges and opportunities within cybersecurity management, the paper discussed them in this article.
Downloads
References
S. T. Hossain, T. Yigitcanlar, K. Nguyen, and Y. Xu, “Local Government Cybersecurity Landscape: A Systematic Review and Conceptual Framework,” Jul. 01, 2024, Multidisciplinary Digital Publishing Institute [MDPI]. doi: 10.3390/app14135501.
M. Homaei, Ó. Mogollón-Gutiérrez, J. C. Sancho, M. Ávila, and A. Caro, “A review of digital twins and their application in cybersecurity based on artificial intelligence,” Artif Intell Rev, vol. 57, no. 8, Aug. 2024, doi: 10.1007/s10462-024-10805-3.
Z. El-Rewini, K. Sadatsharan, D. F. Selvaraj, S. J. Plathottam, and P. Ranganathan, “Cybersecurity challenges in vehicular communications,” Jun. 01, 2020, Elsevier Inc. doi: 10.1016/j.vehcom.2019.100214.
A. H. Salem, S. M. Azzam, O. E. Emam, and A. A. Abohany, “Advancing cybersecurity: a comprehensive review of AI-driven detection techniques,” J Big Data, vol. 11, no. 1, Dec. 2024, doi: 10.1186/s40537-024-00957-y.
L. Ofusori, T. Bokaba, and S. Mhlongo, “Artificial Intelligence in Cybersecurity: A Comprehensive Review and Future Direction,” Applied Artificial Intelligence, vol. 38, no. 1, 2024, doi: 10.1080/08839514.2024.2439609.
Z. M. King, D. S. Henshel, L. Flora, M. G. Cains, B. Hoffman, and C. Sample, “Characterizing and measuring maliciousness for cybersecurity risk assessment,” Feb. 05, 2018, Frontiers Media S.A. doi: 10.3389/fpsyg.2018.00039.
S. L. Garfinkel, “Inside risks the cybersecurity risk,” Jun. 2012. doi: 10.1145/2184319.2184330.
M. L, M. E, and M. A, “Cybersecurity Management for [Industrial] Internet of Things: Challenges and Opportunities,” J Inf Technol Softw Eng, vol. 08, no. 05, 2018, doi: 10.4172/2165-7866.1000250.
M. Toussaint, S. Krima, and H. Panetto, “Industry 4.0 data security: A cybersecurity frameworks review,” May 01, 2024, Elsevier B.V. doi: 10.1016/j.jii.2024.100604.
C. Florackis, C. Louca, R. Michaely, and M. Weber, “NBER WORKING PAPER SERIES CYBERSECURITY RISK,” 2020. [Online]. Available: http://www.nber.org/papers/w28196
M. L, M. E, and M. A, “Cybersecurity Management for [Industrial] Internet of Things: Challenges and Opportunities,” J Inf Technol Softw Eng, vol. 08, no. 05, 2018, doi: 10.4172/2165-7866.1000250.
K. Thakur, M. Qiu, K. Gai, and M. L. Ali, “An Investigation on Cyber Security Threats and Security Models,” in Proceedings - 2nd IEEE International Conference on Cyber Security and Cloud Computing, CSCloud 2015 - IEEE International Symposium of Smart Cloud, IEEE SSC 2015, Institute of Electrical and Electronics Engineers Inc., Jan. 2016, pp. 307–311. doi: 10.1109/CSCloud.2015.71.
A. M. Alenezi, “BEYOND THE CLOUDS: INVESTIGATING DIGITAL CRIMES IN CLOUD ENVIRONMENTS A PREPRINT,” 2024.
S. Muneam, M. Q. Jawad, and D. Hassan, “Survey and comparison of different classification techniques for select appropriate classifier of image,” vol. 7, no. 3, pp. 1396–1404, 2019, [Online]. Available: http://pen.ius.edu.ba
A. M. Alenezi, “BEYOND THE CLOUDS: INVESTIGATING DIGITAL CRIMES IN CLOUD ENVIRONMENTS A PREPRINT,” 2024.
A. M. Alenezi, “BEYOND THE CLOUDS: INVESTIGATING DIGITAL CRIMES IN CLOUD ENVIRONMENTS A PREPRINT,” 2024.
A. M. Alenezi, “BEYOND THE CLOUDS: INVESTIGATING DIGITAL CRIMES IN CLOUD ENVIRONMENTS A PREPRINT,” 2024.
A. M. Alenezi, “BEYOND THE CLOUDS: INVESTIGATING DIGITAL CRIMES IN CLOUD ENVIRONMENTS A PREPRINT,” 2024.
D. Trninić, A. K. Vukelić, and J. Bokan, “Perception of ‘fake news’ and potentially manipulative content in digital media—a generational approach,” Societies, vol. 12, no. 1, Feb. 2022, doi: 10.3390/soc12010003.
A. M. Alenezi, “BEYOND THE CLOUDS: INVESTIGATING DIGITAL CRIMES IN CLOUD ENVIRONMENTS A PREPRINT,” 2024.
A. M. Alenezi, “BEYOND THE CLOUDS: INVESTIGATING DIGITAL CRIMES IN CLOUD ENVIRONMENTS A PREPRINT,” 2024.
M. Pinto and S. Ferreira, “Development of a Website for Creation of Vulnerability Datasets.”
N. Mpekoa, “An Analysis of Cybersecurity Architectures.”
J. Jang-Jaccard and S. Nepal, “A survey of emerging threats in cybersecurity,” in Journal of Computer and System Sciences, Academic Press Inc., 2014, pp. 973–993. doi: 10.1016/j.jcss.2014.02.005.
S. M. Dickson and I. P. OKECHUKWU, “Cyber Security in the Age of the Internet of Things, Constraints, and Solutions,” JOURNAL OF DIGITAL LEARNING AND DISTANCE EDUCATION, vol. 2, no. 11, pp. 829–837, Apr. 2023, doi: 10.56778/jdlde.v2i11.233.
J. B. Ulven and G. Wangen, “A systematic review of cybersecurity risks in higher education,” Feb. 01, 2021, MDPI AG. doi: 10.3390/fi13020039.
J. B. Ulven and G. Wangen, “A systematic review of cybersecurity risks in higher education,” Feb. 01, 2021, MDPI AG. doi: 10.3390/fi13020039.
W. J. Hadi, S. M. Kadhem, and A. R. Abbas, “Fast discrimination of fake video manipulation,” International Journal of Electrical and Computer Engineering, vol. 12, no. 3, pp. 2582–2587, Jun. 2022, doi: 10.11591/ijece.v12i3.pp2582-2587.
W. J. Hadi, S. M. Kadhem, and A. R. Abbas, “A survey of deepfakes in terms of deep learning and multimedia forensics,” International Journal of Electrical and Computer Engineering, vol. 12, no. 4, pp. 4408–4414, Aug. 2022, doi: 10.11591/ijece.v12i4.pp4408-4414.
I. Lee, “Cybersecurity: Risk management framework and investment cost analysis,” Bus Horiz, vol. 64, no. 5, pp. 659–671, Sep. 2021, doi: 10.1016/j.bushor.2021.02.022.
T. Oluwaseun Abrahams et al., “MASTERING COMPLIANCE: A COMPREHENSIVE REVIEW OF REGULATORY FRAMEWORKS IN ACCOUNTING AND CYBERSECURITY,” Computer Science & IT Research Journal, vol. 5, no. 1, pp. 120–140, 2024, doi: 10.51594/csitrj.v5i.709.
T. Oluwaseun Abrahams et al., “MASTERING COMPLIANCE: A COMPREHENSIVE REVIEW OF REGULATORY FRAMEWORKS IN ACCOUNTING AND CYBERSECURITY,” Computer Science & IT Research Journal, vol. 5, no. 1, pp. 120–140, 2024, doi: 10.51594/csitrj.v5i.709.
G. N. Reddy and G. J. U. Reddy, “A STUDY OF CYBER SECURITY CHALLENGES AND ITS EMERGNING TRENDS ON LATEST TECHNOLOGIES.”
T. Oluwaseun Abrahams et al., “CYBERSECURITY AWARENESS AND EDUCATION PROGRAMS: A REVIEW OF EMPLOYEE ENGAGEMENT AND ACCOUNTABILITY,” Computer Science & IT Research Journal, vol. 5, no. 1, pp. 100–119, 2024, doi: 10.51594/csitrj.v5i.708.
J. Kaplan, S. Sharma, and A. Weinberg, “Meeting the cybersecurity challenge.”
M. Humayun, M. Niazi, N. Jhanjhi, M. Alshayeb, and S. Mahmood, “Cyber Security Threats and Vulnerabilities: A Systematic Mapping Study,” Arab J Sci Eng, vol. 45, no. 4, pp. 3171–3189, Apr. 2020, doi: 10.1007/s13369-019-04319-2.
C. Maraveas, M. Rajarajan, K. G. Arvanitis, and A. Vatsanidou, “Cybersecurity threats and mitigation measures in agriculture 4.0 and 5.0,” Dec. 01, 2024, Elsevier B.V. doi: 10.1016/j.atech.2024.100616.
E. A. Fischer, “Cybersecurity Issues and Challenges: In Brief,” 2016. [Online]. Available: www.crs.gov
I. Kumar, “Emerging Threats in Cybersecurity: A Review Article,” 2023. [Online]. Available: http://bluemarkpublishers.com/index.php/IJANS
A. Zineddine et al., “A systematic review of cybersecurity assessment methods for HTTPS,” Computers and Electrical Engineering, vol. 115, Apr. 2024, doi: 10.1016/j.compeleceng.2024.109137.
M. Ahsan, K. E. Nygard, R. Gomes, M. M. Chowdhury, N. Rifat, and J. F. Connolly, “Cybersecurity Threats and Their Mitigation Approaches Using Machine Learning—A Review,” Sep. 01, 2022, Multidisciplinary Digital Publishing Institute [MDPI]. doi: 10.3390/jcp2030027.
A. Shahana et al., “AI-Driven Cybersecurity: Balancing Advancements and Safeguards,” 2024, doi: 10.32996/jcsts.
J. Rahim, M. Ihsan, I. Rahim, A. Afroz, and O. Akinola, “Cybersecurity Threats in Healthcare IT: Challenges, Risks, and Mitigation Strategies”, doi: 10.60087.
I. Jada and T. O. Mayayise, “The impact of artificial intelligence on organisational cyber security: An outcome of a systematic literature review,” Data Inf Manag, vol. 8, no. 2, Jun. 2024, doi: 10.1016/j.dim.2023.100063.
Adebola Folorunso, Temitope Adewumi, Adeola Adewa, Roy Okonkwo, and Tayo Nathaniel Olawumi, “Impact of AI on cybersecurity and security compliance,” Global Journal of Engineering and Technology Advances, vol. 21, no. 1, pp. 167–184, Oct. 2024, doi: 10.30574/gjeta.2024.21.1.0193.
“Assessing the Effects of Cyber Attacks on Financial Markets”, doi: 10.60087.
Philip Olaseni Shoetan, Olukunle Oladipupo Amoo, Enyinaya Stefano Okafor, and Oluwabukunmi Latifat Olorunfemi, “SYNTHESIZING AI’S IMPACT ON CYBERSECURITY IN TELECOMMUNICATIONS: A CONCEPTUAL FRAMEWORK,” Computer Science & IT Research Journal, vol. 5, no. 3, pp. 594–605, Mar. 2024, doi: 10.51594/csitrj.v5i3.908.
Adedoyin Tolulope Oyewole, Chinwe Chinazo Okoye, Onyeka Chrisanctus Ofodile, and Chinonye Esther Ugochukwu, “Cybersecurity risks in online banking: A detailed review and preventive strategies applicatio,” World Journal of Advanced Research and Reviews, vol. 21, no. 3, pp. 625–643, Mar. 2024, doi: 10.30574/wjarr.2024.21.3.0707.
O. Gulyas and G. Kiss, “Impact of cyber-Attacks on the financial institutions,” in Procedia Computer Science, Elsevier B.V., 2023, pp. 84–90. doi: 10.1016/j.procs.2023.01.267.
N. N. Cele and S. Kwenda, “Do cybersecurity threats and risks have an impact on the adoption of digital banking? A systematic literature review,” Jan. 23, 2025, Emerald Publishing. doi: 10.1108/JFC-10-2023-0263.
D. Ghelani, “Cyber Security, Cyber Threats, Implications and Future Perspectives: A Review,” Sep. 22, 2022. doi: 10.22541/au.166385207.73483369/v1.
F. Alharbi et al., “The impact of cybersecurity practices on cyberattack damage: The perspective of small enterprises in Saudi Arabia,” Sensors, vol. 21, no. 20, Oct. 2021, doi: 10.3390/s21206901.
A. I. Mallick and R. Nath, “Navigating the Cyber security Landscape: A Comprehensive Review of Cyber-Attacks, Emerging Trends, and Recent Developments”, [Online]. Available: www.worldscientificnews.com
S. Kumari, P. Pattanaik, and M. Zubair Khan, “Impact of Cybersecurity Measures in theHealthcare Sector: A Comprehensive Review ofContemporary Approaches and EmergingTrends,” International Journal of Education and Management Engineering, vol. 14, no. 6, pp. 1–19, Dec. 2024, doi: 10.5815/ijeme.2024.06.01.
A. Kuzior, I. Tiutiunyk, A. Zielińska, and R. Kelemen, “Cybersecurity and cybercrime: Current trends and threats,” Journal of International Studies, vol. 17, no. 2, pp. 220–239, 2024, doi: 10.14254/2071-8330.2024/17-2/12.
Olukunle Oladipupo Amoo, Akoh Atadoga, Femi Osasona, Temitayo Oluwaseun Abrahams, Benjamin Samson Ayinla, and Oluwatoyin Ajoke Farayola, “GDPR’s impact on cybersecurity: A review focusing on USA and European practices,” International Journal of Science and Research Archive, vol. 11, no. 1, pp. 1338–1347, Feb. 2024, doi: 10.30574/ijsra.2024.11.1.0220.
A. S. George, “Emerging Trends in AI-Driven Cybersecurity: An In-Depth Analysis,” 2024, doi: 10.5281/zenodo.13333202.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Nada Khaleel Kareem

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.








