Vulnerabilities in the internet of things

José Custodio Najar-Pacheco, John Alexander Bohada-Jaime, Wilmar Yovany Rojas-Moreno
{"title":"Vulnerabilities in the internet of things","authors":"José Custodio Najar-Pacheco, John Alexander Bohada-Jaime, Wilmar Yovany Rojas-Moreno","doi":"10.14483/22484728.15163","DOIUrl":null,"url":null,"abstract":"The Internet of Things has allowed the connection of a countless number of devices, which has facilitated control and even decision-making by them, but at the same time security vulnerabilities in operating systems, wireless security protocols, its applications, as well as the vulnerabilities in IoT, acronym in English of Internet of Things, devices, have allowed considerable sums of money to be paid to health institutions and patients for allowing the functionality of their equipment, according to security experts the world is facing a perfect storm which can allows attacks and system hijackings increasing in number, volume and gravity, since when adding more devices, they become access doors for intruders. However, it is important to be aware that everything that connects to the Internet is vulnerable; it has been demonstrated since birth, as well as the IoT.","PeriodicalId":34191,"journal":{"name":"Vision Electronica","volume":" ","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2019-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Vision Electronica","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.14483/22484728.15163","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5

Abstract

The Internet of Things has allowed the connection of a countless number of devices, which has facilitated control and even decision-making by them, but at the same time security vulnerabilities in operating systems, wireless security protocols, its applications, as well as the vulnerabilities in IoT, acronym in English of Internet of Things, devices, have allowed considerable sums of money to be paid to health institutions and patients for allowing the functionality of their equipment, according to security experts the world is facing a perfect storm which can allows attacks and system hijackings increasing in number, volume and gravity, since when adding more devices, they become access doors for intruders. However, it is important to be aware that everything that connects to the Internet is vulnerable; it has been demonstrated since birth, as well as the IoT.
物联网中的漏洞
物联网让无数的设备连接在一起,这有助于它们的控制甚至决策,但与此同时,操作系统的安全漏洞,无线安全协议,其应用程序,以及IoT的漏洞,物联网的英文首字母缩略词,设备,使得医疗机构和患者支付了大量的钱,以允许他们的设备的功能。据安全专家称,世界正面临着一场完美的风暴,这可能会导致攻击和系统劫持的数量、数量和严重性增加,因为当增加更多的设备时,它们就会成为入侵者的入口。然而,重要的是要意识到连接到互联网的一切都是脆弱的;自诞生以来,它就被证明了,物联网也是如此。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
审稿时长
8 weeks
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信