{"title":"POTENTIAL SECURITY ATTACKS VIA THE ILLEGAL DISTRIBUTION OF SINGLE BOARD COMPUTERS","authors":"I.V. Kalinin, V. Sevostyanov","doi":"10.5593/sgem2022/2.1/s07.011","DOIUrl":null,"url":null,"abstract":"The significant development of single-board computers today can create many different threats to information security. These devices open up new opportunities for attackers, as they allow them to find new ways to carry out attacks. Since SBCs are often small in physical size, but have the processing power to run full Linux distributions, combined with a variety of different external interfaces, this allows you to create devices that can listen to sound, photo and video recording, and intercept network traffic. Methods and ways to prevent such violations of information security have not been fully compiled. \nThe use of single-board computers as a tool for violating information security has already been carried out in real conditions. This confirms the urgency of the problem. This is due to the fact that these devices have increased energy efficiency, universal software, low cost, as well as ways to work in difficult environmental conditions. Such characteristics make it easier to penetrate into controlled areas, negotiation zones, and the like in order to violate the information security of workplaces. For example, a board with a wireless controller connected to an external power source is capable of intercepting network traffic, and a single-board computer with interfaces for connecting external devices, disguised as some other household item, is capable of taking photos and videos. \nOne of the key methods of combating these violations is understanding the principles of operation and use of single-board computers by intruders in illegal actions, the purpose of which is to violate information security.","PeriodicalId":375880,"journal":{"name":"22nd SGEM International Multidisciplinary Scientific GeoConference Proceedings 2022, Informatics, Geoinformatics and Remote Sensing","volume":"48 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"22nd SGEM International Multidisciplinary Scientific GeoConference Proceedings 2022, Informatics, Geoinformatics and Remote Sensing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.5593/sgem2022/2.1/s07.011","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
The significant development of single-board computers today can create many different threats to information security. These devices open up new opportunities for attackers, as they allow them to find new ways to carry out attacks. Since SBCs are often small in physical size, but have the processing power to run full Linux distributions, combined with a variety of different external interfaces, this allows you to create devices that can listen to sound, photo and video recording, and intercept network traffic. Methods and ways to prevent such violations of information security have not been fully compiled.
The use of single-board computers as a tool for violating information security has already been carried out in real conditions. This confirms the urgency of the problem. This is due to the fact that these devices have increased energy efficiency, universal software, low cost, as well as ways to work in difficult environmental conditions. Such characteristics make it easier to penetrate into controlled areas, negotiation zones, and the like in order to violate the information security of workplaces. For example, a board with a wireless controller connected to an external power source is capable of intercepting network traffic, and a single-board computer with interfaces for connecting external devices, disguised as some other household item, is capable of taking photos and videos.
One of the key methods of combating these violations is understanding the principles of operation and use of single-board computers by intruders in illegal actions, the purpose of which is to violate information security.