Page 238 - Kaleidoscope Academic Conference Proceedings 2024
P. 238
2024 ITU Kaleidoscope Academic Conference
[8] Ukraine war spotlights agriculture sector’s vulnerability [20] National Vulnerability Database (NVD), https://nvd.
to cyber attack, https://blog.talosintelligence.com/ nist.gov/, Accessed on May 9, 2024.
ukraine-and-fragility-of-agriculture/, Accessed on May
[21] The IoT Cybersecurity Improvement Act, https://www.
9, 2024.
congress.gov/bill/116th-congress/house-bill/1668,
[9] IoT Security: Protecting Food and Agriculture Accessed on May 9, 2024.
Organizations, https://securityintelligence.com/
[22] SB-327 Information privacy: connected devices.,
articles/iot-security-food-agriculture/, Accessed on
https://leginfo.legislature.ca.gov/faces/billTextClient.
May 9, 2024.
xhtml?bill_id=201720180SB327, Accessed on May 9,
[10] Hacking Farm to Table: Uncovering Threats 2024.
to Agriculture, https://www.crowdstrike.com/blog/
[23] Cybersecurity Act, https://digital-strategy.ec.europa.
how-threat-hunting-uncovered-attacks-in-the-
eu/en/policies/cybersecurity-act, Accessed on May 9,
agriculture-industry/, Accessed on May 9, 2024.
2024.
[11] Shodan. "Shodan: The search engine for
[24] EU Cyber Resilience Act, https://digital-strategy.ec.
internet-connected devices.", https://www.shodan.io/,
europa.eu/en/library/cyber-resilience-act, Accessed on
Accessed on May 9, 2024.
May 9, 2024.
[12] Yaser Jararweh, Sana Fatima, Moath Jarrah, [25] Product Security and Telecommunications
Shadi AlZu’bi, “Smart and sustainable agriculture: Infrastructure Act 2022, https://www.legislation.
Fundamentals, enabling technologies, and future gov.uk/ukpga/2022/46/contents/enacted, Accessed on
directions,” Computers and Electrical Engineering, May 9, 2024.
vol. 110 no. 12, 2023.
[26] ETSI TS 103 645 V2.1.2 (2020-06), https:
[13] Rajasekar. V., Rajkumar. S., “A Study on Internet //www.etsi.org/deliver/etsi_ts/103600_103699/
of Things Devices Vulnerabilities using Shodan,” 103645/02.01.02_60/ts_103645v020102p.pdf,
International Journal of Computing, vol. 2 no. 2, Accessed on May 9, 2024.
pp. 149-158, 2023.
[27] ISO/IEC 27400:2022, https://www.iso.org/standard/
[14] Mulero-Palencia, Sofía, and Victor Monzon Baeza, 44373.html, Accessed on May 9, 2024.
“Detection of Vulnerabilities in Smart Buildings Using
[28] CSA IoT Security Controls Framework
the Shodan Tool,”, Electronics 2023, vol. 12 no. 23,
v2, https://cloudsecurityalliance.org/artifacts/
pp. 4815, 2023.
csa-iot-security-controls-framework-v2, Accessed
[15] Raghuvanshi, Abhishek, Umesh Kumar Singh, on May 9, 2024.
Thanwamas Kassanuk, and Khongdet Phasinam,
[29] GSMA IoT Security Guidelines and
“Internet of Things: Security vulnerabilities and
Assessment, https://www.gsma.com/iot/iot-security/
countermeasures,”, ECS Transactions, vol. 107 no. 1,
iot-security-guidelines/, Accessed on May 9, 2024.
pp. 15043-15052, 2022.
[30] ETSI EN 303 645 V2.1.1 (2020-06), https:
[16] Alsmadi, Izzat, Zyad Dwekat, Ricardo Cantu, and Bilal
//www.etsi.org/deliver/etsi_en/303600_303699/
Al-Ahmad, “Vulnerability assessment of industrial
303645/02.01.01_60/en_303645v020101p.pdf,
systems using Shodan,”, Cluster Computing, vol. 25
Accessed on May 9, 2024.
no. 3, pp. 1563–1573, 2022.
[31] NISTIR 8259A, https://nvlpubs.nist.gov/nistpubs/ir/
[17] Tiago M. Fernández-Caramés, P. Rughani, “Teaching
2020/NIST.IR.8259A.pdf, Accessed on May 9, 2024.
and Learning IoT Cybersecurity and Vulnerability
Assessment with Shodan through Practical Use Cases,” [32] ENISA Baseline Security Recommendations for
Sensors 2020, vol. 20 no. 11, pp. 3048, 2020. IoT, https://www.enisa.europa.eu/publications/
baseline-security-recommendations-for-iot, Accessed
[18] AGRI NEXT. "Products Directory (2023)", on May 9, 2024.
https://www.jagri-global.jp/tokyo/en-gb/search/
2023/product.html, Accessed on May 9, 2024. [33] Securing the Internet of Things for Consumers,
https://www.homeaffairs.gov.au/reports-and-pubs/
[19] D.Inoue, K.Yoshioka, M.Eto, M.Yamagata, E.Nishino, files/code-of-practice.pdf, Accessed on May 9, 2024.
J.Takeuchi, K.Ohkouchi, and K.Nakao, “An Incident
Analysis System NICTER and Its Analysis Engines [34] Food and Ag-ISAC, https://www.foodandag-isac.org/,
Based on Data Mining Techniques,” Advances Accessed on May 9, 2024.
in Neuro-Information Processing, Springer Berlin
Heidelberg, pp. 579-586, 2009.
– 194 –