José Custodio Najar-Pacheco, John Alexander Bohada-Jaime, Wilmar Yovany Rojas-Moreno
{"title":"物联网中的漏洞","authors":"José Custodio Najar-Pacheco, John Alexander Bohada-Jaime, Wilmar Yovany Rojas-Moreno","doi":"10.14483/22484728.15163","DOIUrl":null,"url":null,"abstract":"The Internet of Things has allowed the connection of a countless number of devices, which has facilitated control and even decision-making by them, but at the same time security vulnerabilities in operating systems, wireless security protocols, its applications, as well as the vulnerabilities in IoT, acronym in English of Internet of Things, devices, have allowed considerable sums of money to be paid to health institutions and patients for allowing the functionality of their equipment, according to security experts the world is facing a perfect storm which can allows attacks and system hijackings increasing in number, volume and gravity, since when adding more devices, they become access doors for intruders. However, it is important to be aware that everything that connects to the Internet is vulnerable; it has been demonstrated since birth, as well as the IoT.","PeriodicalId":34191,"journal":{"name":"Vision Electronica","volume":" ","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2019-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"Vulnerabilities in the internet of things\",\"authors\":\"José Custodio Najar-Pacheco, John Alexander Bohada-Jaime, Wilmar Yovany Rojas-Moreno\",\"doi\":\"10.14483/22484728.15163\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The Internet of Things has allowed the connection of a countless number of devices, which has facilitated control and even decision-making by them, but at the same time security vulnerabilities in operating systems, wireless security protocols, its applications, as well as the vulnerabilities in IoT, acronym in English of Internet of Things, devices, have allowed considerable sums of money to be paid to health institutions and patients for allowing the functionality of their equipment, according to security experts the world is facing a perfect storm which can allows attacks and system hijackings increasing in number, volume and gravity, since when adding more devices, they become access doors for intruders. However, it is important to be aware that everything that connects to the Internet is vulnerable; it has been demonstrated since birth, as well as the IoT.\",\"PeriodicalId\":34191,\"journal\":{\"name\":\"Vision Electronica\",\"volume\":\" \",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-07-26\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Vision Electronica\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.14483/22484728.15163\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Vision Electronica","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.14483/22484728.15163","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
The Internet of Things has allowed the connection of a countless number of devices, which has facilitated control and even decision-making by them, but at the same time security vulnerabilities in operating systems, wireless security protocols, its applications, as well as the vulnerabilities in IoT, acronym in English of Internet of Things, devices, have allowed considerable sums of money to be paid to health institutions and patients for allowing the functionality of their equipment, according to security experts the world is facing a perfect storm which can allows attacks and system hijackings increasing in number, volume and gravity, since when adding more devices, they become access doors for intruders. However, it is important to be aware that everything that connects to the Internet is vulnerable; it has been demonstrated since birth, as well as the IoT.