This thesis is about the design of an IoT privacy label and the methodologies to collect the necessary information to populate the privacy label for an IoT product and its entire ecosystem. The privacy risks of IoT ecosystems are determined by testing all components in the ecosystem for vulnerabilities. These vulnerabilities can be found by security scans, penetration tests and audits, and quantified by using the Common Vulnerability Scoring System (CSS). The level of the privacy risk can be determined and expressed by combining the sensitivity of the personal information being processed and the vulnerabilities in the IoT ecosystem. A conceptual six-layer IoT service model has been developed to better understand the architecture of the IoT product and to structurally test all components. Three case studies were performed in this research to assess and improve the methodologies and design of the privacy label.

 

Key words: IoT ecosystem, privacy risk matrix, privacy label, IoT security testing

 

READ PDF >

 

 

 

  • A methodology for quantifying the level of cybersecurity...
    Master CS/Robert de Vries
    >
  • A methodology for qu...
    Master CS/Robert de Vries
    >
  • A methodology for quantifying the level of cybersecurity...
    Master CS/Robert de Vries
    >
  • A security architecture for software defined wide area n...
    Master CS/Mark Dirksen
    >
  • A security architect...
    Master CS/Mark Dirksen
    >
  • A security architecture for software defined wide area n...
    Master CS/Mark Dirksen
    >
  • Are the Dutch government controls for the protection of...
    Master CS/Erik van Garderen
    >
  • Are the Dutch govern...
    Master CS/Erik van Garderen
    >
  • Are the Dutch government controls for the protection of...
    Master CS/Erik van Garderen
    >
  • Can a Robot Do My Job? A Study on the Potential of Artif...
    Master CS/Esther van Luit
    >
  • Can a Robot Do My Jo...
    Master CS/Esther van Luit
    >
  • Can a Robot Do My Job? A Study on the Potential of Artif...
    Master CS/Esther van Luit
    >
  • Exploring the Dutch Digital Infrastructure. Data Issues,...
    Master CS/Alex Claver
    >
  • Exploring the Dutch...
    Master CS/Alex Claver
    >
  • Exploring the Dutch Digital Infrastructure. Data Issues,...
    Master CS/Alex Claver
    >
  • Improving cyber safety awareness education at Dutch elem...
    Master CS/Arjan Spiering
    >
  • Improving cyber safe...
    Master CS/Arjan Spiering
    >
  • Improving cyber safety awareness education at Dutch elem...
    Master CS/Arjan Spiering
    >
  • Policy instruments and the adoption of DNSSEC; A case st...
    Master CS/Rene Bakker
    >
  • Policy instruments a...
    Master CS/Rene Bakker
    >
  • Policy instruments and the adoption of DNSSEC; A case st...
    Master CS/Rene Bakker
    >
  • Processing Electromagnetic Parameters from a Secret Data...
    Master CS/Susan Varenbrink
    >
  • Processing Electroma...
    Master CS/Susan Varenbrink
    >
  • Processing Electromagnetic Parameters from a Secret Data...
    Master CS/Susan Varenbrink
    >
  • Reports, Rewards, and Recriminations. A critical look at...
    Master CS/Kees Wassenaar
    >
  • Reports, Rewards, an...
    Master CS/Kees Wassenaar
    >
  • Reports, Rewards, and Recriminations. A critical look at...
    Master CS/Kees Wassenaar
    >
  • Risk assessment for I2P with an enhanced outproxy design
    Master CS/Dolf Smits
    >
  • Risk assessment for...
    Master CS/Dolf Smits
    >
  • Risk assessment for I2P with an enhanced outproxy design
    Master CS/Dolf Smits
    >
  • The Internet of Things: a privacy label for IoT products...
    Master CS/Rob van Diermen
    >
  • The Internet of Thin...
    Master CS/Rob van Diermen
    >
  • The Internet of Things: a privacy label for IoT products...
    Master CS/Rob van Diermen
    >
  • The Unified Kill Chain
    Master CS/Paul Pols
    >
  • The Unified Kill Cha...
    Master CS/Paul Pols
    >
  • The Unified Kill Chain
    Master CS/Paul Pols
    >

This website uses cookies to ensure you get the best experience on our website. By continuing to browse the site, you are agreeing to our use of cookies.. More info

 

I AGREE