通过非法分发单板计算机进行潜在的安全攻击

I.V. Kalinin, V. Sevostyanov
{"title":"通过非法分发单板计算机进行潜在的安全攻击","authors":"I.V. Kalinin, V. Sevostyanov","doi":"10.5593/sgem2022/2.1/s07.011","DOIUrl":null,"url":null,"abstract":"The significant development of single-board computers today can create many different threats to information security. These devices open up new opportunities for attackers, as they allow them to find new ways to carry out attacks. Since SBCs are often small in physical size, but have the processing power to run full Linux distributions, combined with a variety of different external interfaces, this allows you to create devices that can listen to sound, photo and video recording, and intercept network traffic. Methods and ways to prevent such violations of information security have not been fully compiled. \nThe use of single-board computers as a tool for violating information security has already been carried out in real conditions. This confirms the urgency of the problem. This is due to the fact that these devices have increased energy efficiency, universal software, low cost, as well as ways to work in difficult environmental conditions. Such characteristics make it easier to penetrate into controlled areas, negotiation zones, and the like in order to violate the information security of workplaces. For example, a board with a wireless controller connected to an external power source is capable of intercepting network traffic, and a single-board computer with interfaces for connecting external devices, disguised as some other household item, is capable of taking photos and videos. \nOne of the key methods of combating these violations is understanding the principles of operation and use of single-board computers by intruders in illegal actions, the purpose of which is to violate information security.","PeriodicalId":375880,"journal":{"name":"22nd SGEM International Multidisciplinary Scientific GeoConference Proceedings 2022, Informatics, Geoinformatics and Remote Sensing","volume":"48 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"POTENTIAL SECURITY ATTACKS VIA THE ILLEGAL DISTRIBUTION OF SINGLE BOARD COMPUTERS\",\"authors\":\"I.V. Kalinin, V. Sevostyanov\",\"doi\":\"10.5593/sgem2022/2.1/s07.011\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The significant development of single-board computers today can create many different threats to information security. These devices open up new opportunities for attackers, as they allow them to find new ways to carry out attacks. Since SBCs are often small in physical size, but have the processing power to run full Linux distributions, combined with a variety of different external interfaces, this allows you to create devices that can listen to sound, photo and video recording, and intercept network traffic. Methods and ways to prevent such violations of information security have not been fully compiled. \\nThe use of single-board computers as a tool for violating information security has already been carried out in real conditions. This confirms the urgency of the problem. This is due to the fact that these devices have increased energy efficiency, universal software, low cost, as well as ways to work in difficult environmental conditions. Such characteristics make it easier to penetrate into controlled areas, negotiation zones, and the like in order to violate the information security of workplaces. For example, a board with a wireless controller connected to an external power source is capable of intercepting network traffic, and a single-board computer with interfaces for connecting external devices, disguised as some other household item, is capable of taking photos and videos. \\nOne of the key methods of combating these violations is understanding the principles of operation and use of single-board computers by intruders in illegal actions, the purpose of which is to violate information security.\",\"PeriodicalId\":375880,\"journal\":{\"name\":\"22nd SGEM International Multidisciplinary Scientific GeoConference Proceedings 2022, Informatics, Geoinformatics and Remote Sensing\",\"volume\":\"48 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-11-15\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"22nd SGEM International Multidisciplinary Scientific GeoConference Proceedings 2022, Informatics, Geoinformatics and Remote Sensing\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.5593/sgem2022/2.1/s07.011\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"22nd SGEM International Multidisciplinary Scientific GeoConference Proceedings 2022, Informatics, Geoinformatics and Remote Sensing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.5593/sgem2022/2.1/s07.011","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

当今单板计算机的显著发展会对信息安全造成许多不同的威胁。这些设备为攻击者提供了新的机会,因为它们允许他们找到实施攻击的新方法。由于sbc的物理尺寸通常很小,但具有运行完整Linux发行版的处理能力,并结合各种不同的外部接口,因此可以创建可以侦听声音、照片和视频记录以及拦截网络流量的设备。防止此类信息安全侵害的方法和途径尚未完全编制。利用单板计算机作为侵犯信息安全的工具已经在现实条件下进行。这证实了问题的紧迫性。这是因为这些设备具有提高能源效率、通用软件、低成本以及在困难环境条件下工作的方法。这样的特点使得它更容易渗透到控制区、谈判区等,从而侵犯工作场所的信息安全。例如,带有连接外部电源的无线控制器的电路板能够拦截网络流量,而带有连接外部设备接口的单板计算机伪装成其他家用物品,能够拍摄照片和视频。打击这些违规行为的关键方法之一是了解入侵者在非法行动中操作和使用单板计算机的原理,其目的是侵犯信息安全。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
POTENTIAL SECURITY ATTACKS VIA THE ILLEGAL DISTRIBUTION OF SINGLE BOARD COMPUTERS
The significant development of single-board computers today can create many different threats to information security. These devices open up new opportunities for attackers, as they allow them to find new ways to carry out attacks. Since SBCs are often small in physical size, but have the processing power to run full Linux distributions, combined with a variety of different external interfaces, this allows you to create devices that can listen to sound, photo and video recording, and intercept network traffic. Methods and ways to prevent such violations of information security have not been fully compiled. The use of single-board computers as a tool for violating information security has already been carried out in real conditions. This confirms the urgency of the problem. This is due to the fact that these devices have increased energy efficiency, universal software, low cost, as well as ways to work in difficult environmental conditions. Such characteristics make it easier to penetrate into controlled areas, negotiation zones, and the like in order to violate the information security of workplaces. For example, a board with a wireless controller connected to an external power source is capable of intercepting network traffic, and a single-board computer with interfaces for connecting external devices, disguised as some other household item, is capable of taking photos and videos. One of the key methods of combating these violations is understanding the principles of operation and use of single-board computers by intruders in illegal actions, the purpose of which is to violate information security.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信