Simulation of cyber threats for the Internet of Things

A. Belov, Maxim Delembovsky, V. Shklyar
{"title":"Simulation of cyber threats for the Internet of Things","authors":"A. Belov, Maxim Delembovsky, V. Shklyar","doi":"10.32347/tit2141.0303","DOIUrl":null,"url":null,"abstract":"The modern world is impossible to imagine without information technology. Such technologies are based on the use of computer equipment and means of communication. Both in the real world and in the virtual world, there are crimes called \"cybercrimes\". Thus, energy facilities, transport systems, financial and banking structures, military and law enforcement agencies, trade, medical and scientific institutions are potential victims of cybercrime, including cyberterrorism. Surveillance cameras, motion sensors, biochips, smart appliances - all these things simplify our daily lives and make our modern life more comfortable. As the number of devices connected to the network grows, so does the number of cyber threats. For example, the smart refrigerator became part of the botnet and began to spread spam, and the smart coffee machine was the cause of the attack on industrial networks with the subsequent infection of computers. The Internet of Things, which in turn is simple and difficult to implement, also has some problems with information security. Sometimes developers, intentionally or unintentionally, leave an undocumented channel, which not only collects information about the use of the device, but also allows you to penetrate into the personal space of the end user. In case of personal data leakage, the purpose of fraudsters is usually personal data: names, postal addresses, e-mail addresses, credit card details or account information. This allows you to order goods online under someone else's name and pay for them using someone else's debit card or debiting a certain account. For the same purpose, phishing can be used, which involves the use of fictitious websites, e-mails or text messages to access personal data.","PeriodicalId":434555,"journal":{"name":"Transfer of innovative technologies","volume":"12 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Transfer of innovative technologies","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.32347/tit2141.0303","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

The modern world is impossible to imagine without information technology. Such technologies are based on the use of computer equipment and means of communication. Both in the real world and in the virtual world, there are crimes called "cybercrimes". Thus, energy facilities, transport systems, financial and banking structures, military and law enforcement agencies, trade, medical and scientific institutions are potential victims of cybercrime, including cyberterrorism. Surveillance cameras, motion sensors, biochips, smart appliances - all these things simplify our daily lives and make our modern life more comfortable. As the number of devices connected to the network grows, so does the number of cyber threats. For example, the smart refrigerator became part of the botnet and began to spread spam, and the smart coffee machine was the cause of the attack on industrial networks with the subsequent infection of computers. The Internet of Things, which in turn is simple and difficult to implement, also has some problems with information security. Sometimes developers, intentionally or unintentionally, leave an undocumented channel, which not only collects information about the use of the device, but also allows you to penetrate into the personal space of the end user. In case of personal data leakage, the purpose of fraudsters is usually personal data: names, postal addresses, e-mail addresses, credit card details or account information. This allows you to order goods online under someone else's name and pay for them using someone else's debit card or debiting a certain account. For the same purpose, phishing can be used, which involves the use of fictitious websites, e-mails or text messages to access personal data.
模拟物联网的网络威胁
没有信息技术的现代世界是无法想象的。这些技术的基础是使用计算机设备和通信手段。无论是在现实世界还是在虚拟世界,都有被称为“网络犯罪”的犯罪。因此,能源设施、运输系统、金融和银行结构、军事和执法机构、贸易、医疗和科学机构都是包括网络恐怖主义在内的网络犯罪的潜在受害者。监控摄像头、运动传感器、生物芯片、智能家电——所有这些东西都简化了我们的日常生活,使我们的现代生活更加舒适。随着连接到网络的设备数量的增加,网络威胁的数量也在增加。例如,智能冰箱成为僵尸网络的一部分,开始传播垃圾邮件,智能咖啡机成为攻击工业网络的原因,随后感染计算机。物联网简单而难以实现,同时也存在一些信息安全问题。有时开发人员有意或无意地留下一个未记录的通道,这不仅收集有关设备使用的信息,而且还允许您深入到最终用户的个人空间。在个人资料外泄的情况下,诈骗者的目的通常是个人资料:姓名、邮政地址、电子邮件地址、信用卡资料或帐户资料。这允许你以别人的名义在网上订购商品,并使用别人的借记卡或借记某个账户付款。出于同样的目的,可以使用网络钓鱼,这涉及使用虚构的网站,电子邮件或短信来访问个人数据。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信