Threat modelling and vulnerability assessment for IoT solutions: a case study

dc.contributor.authorParvanov, Krasen Anatoliev
dc.contributor.authorTsagkidis, Chrysostomos
dc.contributor.departmentGöteborgs universitet/Institutionen för data- och informationsteknikswe
dc.contributor.departmentUniversity of Gothenburg/Department of Computer Science and Engineeringeng
dc.date.accessioned2022-07-06T08:17:15Z
dc.date.available2022-07-06T08:17:15Z
dc.date.issued2022-07-06
dc.description.abstractThe cyber-security for Internet of Things (IoT) is of great importance for the future of the software industry, especially since the number of IoT devices rapidly increases. Therefore, it is important that practitioners consider threat modelling and vulnerability assessment in their software development process. The goal of this study is to inspect how threat modelling and vulnerability assessment is applied in applied in industry. The study is conducted as a single case study with an IoT company, in order to explore the aforementioned security aspects from the practitoner's perspective, by conducting interviews and by looking into the documentation of an IoT solution, as well as existing literature. Results indicate that although threat modelling constitutes a well researched area, tehre is evidence that it is not well integrated into the overall software development process. However, practitioners do perform threat identification analysis in their work without applying a particular methodology. In addition, a lack of a systemativ and structured process when performing vulnerability assessment activities was evident. Practitioners appear to evalute their design and architecture, but there is a need for a strategy for integration of security testing and penetration testing into the software development life cycle (SDLC). Our findings are summarised into recommendations to practitioners with a list of open source penetration testing tools, guidelines, and suggestions for conducting threat modelling and vulnerability assessment. Futhermore, our scientific contributions provide insights on the work process that is in place in the industry, in regards to threat modelling and vulnerability assesment.en
dc.identifier.urihttps://hdl.handle.net/2077/72699
dc.language.isoengen
dc.setspec.uppsokTechnology
dc.subjectTerms Threat Modellingen
dc.subjectInternet of Thingsen
dc.subjectIoTen
dc.subjectVulnerabilitiesen
dc.subjectVulnerability assessmenten
dc.subjectPenetration testing toolsen
dc.titleThreat modelling and vulnerability assessment for IoT solutions: a case studyen
dc.title.alternativeThreat modelling and vulnerability assessment for IoT solutions: a case studyen
dc.typetext
dc.type.degreeStudent essay
dc.type.uppsokM2

Files

Original bundle

Now showing 1 - 1 of 1
No Thumbnail Available
Name:
CSE 22-07 KAP CT.pdf
Size:
1.13 MB
Format:
Adobe Portable Document Format
Description:

License bundle

Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
876 B
Format:
Item-specific license agreed upon to submission
Description: