Open Access

Improving Internet of Things Vulnerability Disclosure and Coordination

   | Jul 14, 2023

Cite

Arora, A., Krishnan, R, Telang, R, Yang, Y. (2010). An Empirical Analysis of Software Vendors’ Patch Release Behavior: Impact of Vulnerability Disclosure, retrieved at https://pubsonline.informs.org/doi/abs/10.1287/isre.1080.0226 Search in Google Scholar

Arora, A,. Xu, H, Telang, R. (2008). Optimal Policy for Software Vulnerability Disclosure, retrieved at https://pubsonline.informs.org/doi/abs/10.1287/mnsc.1070.0771? Journal Code=mnsc Search in Google Scholar

AT&T Internet Security with ActiveArmor, retrieved on Feb 08, 2022 at https://www.att.com/support/article/u-verse-high-speed-internet/KM1399140/ Search in Google Scholar

Balan, A. (2021). DEFCON 29 IoT Village - Jay Balan - 5 Years of IoT Vulnerability Research and Countless 0days, retrieved at https://www.youtube.com/watch?v=xUb190HQtjA&t=2254s Search in Google Scholar

Berte, DR. (2018). Defining the IoT, retrieved at https://sciendo.com/pdf/10.2478/picbe-2018-0013 Search in Google Scholar

Collela, P. (2021). Ushering in a Better Connected Future, retrieved at https://www.ericsson.com/en/about-us/company-facts/ericsson-worldwide/india/authored-articles/ushering-in-a-better-connected-future Search in Google Scholar

Comcast Advanced Security, retrieved on Feb 08, 2022 at https://www.xfinity.com/learn/internet-service Search in Google Scholar

Daws, R. (2021). Kaspersky: Attacks on IoT devices double in a year retrieved at https://iottechnews.com/news/2021/sep/07/kaspersky-attacks-on-iot-devices-double-in-a-year/ Search in Google Scholar

Day, Jeff et al. (2022). Vulnerability Disclosure: Best Practice Guidelines, retrieved at http://www.open-access.bcu.ac.uk/12218/ Search in Google Scholar

Ding, A.Y., De Jesus G.L. & Janssen, M. (2019). Ethical Hacking for IoT Security: A First Look into Bug Bounty Programs and Responsible Disclosure Search in Google Scholar

Flynn, JR., Francis J. (2019). Ring LLC Privacy Litigation, as retrieved at https://www.courtlistener.com/docket/16630199/1/orange-v-ring-llc/ Search in Google Scholar

Gartner, Inc., (2018). Emerging Technology Analysis: Bug Bounties and Crowdsourced Security Testing. Search in Google Scholar

Google Project Zero Policy and Disclosure, retrieved on Feb 08, 2022 at https://googleprojectzero.blogspot.com/2020/01/policy-and-disclosure-2020-edition.html Search in Google Scholar

ISO.org. (2018). Information technology – Security techniques – Vulnerability disclosure, retrieved at https://www.iso.org/standard/72311.html Search in Google Scholar

Istrate, C. (2020). Bitdefender, THE STATE OF IoT SECURITY IN 2020 Search in Google Scholar

Mehraban, S. (2017). Component Lifespan Considerations for Industrial IoT OEMs, retrieved at https://www.lantronix.com/blog/component-lifespan-considerations-for-industrial-iot-oems/ Search in Google Scholar

Netgear Armor, retrieved on Feb 08, 2022 at https://www.netgear.com/home/services/armor/ Search in Google Scholar

OECD. (2021).Teleworking in the COVID-19 Pandemic: Trends and Prospects, retrieved at https://read.oecd-ilibrary.org/view/?ref=1108_1108540-p249kho0iu&title=Teleworkingin-the-COVID-19-pandemic-Trends-and-prospects Search in Google Scholar

Routley, N. (2020). 6 charts that show what employers and employees really think about remote working, retrieved at https://www.weforum.org/agenda/2020/06/coronavirus-covid19-remote-working-office-employees-employers Search in Google Scholar

Stahie, S. (2020). Mozi Botnet Accounts for Most Traffic in Q1 2020, New Research Shows, retrieved at https://www.bitdefender.com/blog/hotforsecurity/mozi-botnet-accounts-traffic-q1-2020-new-research-shows Search in Google Scholar

Todor, R. (2021). Bitdefender, THE STATE OF SMART HOME SECURITY IN 2021 AND BEYOND Search in Google Scholar

White, C., Barrett, J., (2022), Data Privacy and Security in the Connected Home, retrieved at https://www.parksassociates.com/marketfocus/data-privacy Search in Google Scholar

eISSN:
2558-9652
Language:
English