Articles Data Breaches and Identity Theft | Page 11
74 M. Abomhara and G. M. Køien
through remote access mechanisms. The most common attacks on user
privacy are:
• Data mining: enables attackers to discover information that is not
anticipated in certain databases.
• Cyber espionage: using cracking techniques and malicious software
to spy or obtain secret information of individuals, organizations or
the government.
• Eavesdropping: listening to a conversation between two par-
ties [43].
• Tracking: a users movements can be tracked by the devices unique
identification number (UID). Tracking a users location facilitates
identifying them in situations in which they wish to remain
anonymous.
• Password-based attacks: attempts are made by intruders to duplicate
a valid user password. This attempt can be made in two different
ways: 1) dictionary attack – trying possible combinations of letters
and numbers to guess user passwords; 2) brute force attacks – using
cracking tools to try all possible combinations of passwords to
uncover valid passwords.
(f) Cyber-crimes: The Internet and smart objects are used to exploit users
and data for materialistic gain, such as intellectual property theft, identity
theft, brand theft, and fraud [6, 7, 44].
(g) Destructive attacks: Space is used to create large-scale disruption and
destruction of life and property. Examples of destructive attacks are
terrorism and revenge attacks.
(h) Supervisory Control and Data Acquisition (SCADA) Attacks: As any
other TCP/IP systems, the SCADA [45] system is vulnerable to many
cyber attacks [46, 47]. The system can be attacked in any of the following
ways:
i. Using denial-of-service to shut down the system.
ii. Using Trojans or viruses to take control of the system. For instance,
in 2008 an attack launched on an Iranian nuclear facility in Natanz
using a virus named Stuxnet [48].
2.3 Primary Security and Privacy Goals
To succeed with the implementation of efficient IoT security, we must be
aware of the primary security goals as follows: