{"title":"用于软件书签的PON路由器固件研究","authors":"D. E. Peshkow, A. Shabrova","doi":"10.33764/2618-981x-2022-6-192-196","DOIUrl":null,"url":null,"abstract":"Network routers are an integral part of any corporate and home network. The number of devices in an organization's network can number in the dozens and it is not always possible to monitor the relevance of versions or their security. This is often used by malefactors and unscrupulous manufacturers. And in order not to prevent the consequences of a hacker attack, it is necessary to carry out activities in a timely manner to ensure information security. And you need to start with network devices and their diversity. Each such device has a firmware that specialists can check and detect both vulnerabilities and planned software bookmarks, such as backdoors, in it. To simplify and speed up this work, you can use a firmware scanner.","PeriodicalId":13672,"journal":{"name":"Interexpo GEO-Siberia","volume":"43 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2022-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Research of firmware of PON routers for software bookmarks\",\"authors\":\"D. E. Peshkow, A. Shabrova\",\"doi\":\"10.33764/2618-981x-2022-6-192-196\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Network routers are an integral part of any corporate and home network. The number of devices in an organization's network can number in the dozens and it is not always possible to monitor the relevance of versions or their security. This is often used by malefactors and unscrupulous manufacturers. And in order not to prevent the consequences of a hacker attack, it is necessary to carry out activities in a timely manner to ensure information security. And you need to start with network devices and their diversity. Each such device has a firmware that specialists can check and detect both vulnerabilities and planned software bookmarks, such as backdoors, in it. To simplify and speed up this work, you can use a firmware scanner.\",\"PeriodicalId\":13672,\"journal\":{\"name\":\"Interexpo GEO-Siberia\",\"volume\":\"43 1\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-05-18\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Interexpo GEO-Siberia\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.33764/2618-981x-2022-6-192-196\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Interexpo GEO-Siberia","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.33764/2618-981x-2022-6-192-196","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Research of firmware of PON routers for software bookmarks
Network routers are an integral part of any corporate and home network. The number of devices in an organization's network can number in the dozens and it is not always possible to monitor the relevance of versions or their security. This is often used by malefactors and unscrupulous manufacturers. And in order not to prevent the consequences of a hacker attack, it is necessary to carry out activities in a timely manner to ensure information security. And you need to start with network devices and their diversity. Each such device has a firmware that specialists can check and detect both vulnerabilities and planned software bookmarks, such as backdoors, in it. To simplify and speed up this work, you can use a firmware scanner.