Research on Cybersecurity Threats and Solutions in Edge Computing

  • Author(s) / Creator(s)
  • In recent years, edge computing has been accelerated greatly by the proliferation of IoT and smart mobile devices. While edge computing has been of immense help to mobile devices in their quest to complete complex tasks, its rapid growth has led to a widespread disregard for security risks in edge computing platforms and the apps they allow. This research is about attacks on cybersecurity in edge computing and how to stop them. The
    study looks at all the research on the subject and analyses the different types of security threats that can affect edge computing, such as data interception, device tampering, and malware attacks.
    DDoS assaults, to be more exact, are the centre of our attention because they are responsible for thirty percent of all edge computing attacks that have been recently reported by Statista. Edge computing, IoT, 5G and Cloud Computing are the key drivers of the digital transformation that is taking place across industries. However, as the use of these technologies becomes more widespread, so does the number and complexity of cybersecurity
    threats. This research investigates the cybersecurity attacks and solutions in edge computing, IoT, and cloud computing, examining the interplay between these technologies and their associated security risks.
    The report emphasises the need for defence-in-depth to solve edge computing's broad and complex security issues. The report also emphasises the necessity for industry professionals, governments, and researchers to collaborate on cybersecurity strategies and best practises that can adapt to the ever-changing cybersecurity scene. This research can help companies secure and protect their edge computing platforms.

  • Date created
    2023-04-01
  • Subjects / Keywords
  • Type of Item
    Report
  • DOI
    https://doi.org/10.7939/r3-twy5-z494
  • License
    Attribution-NonCommercial 4.0 International