STUDY OF VULNERABILITIES IN IOT ENVIRONMENTS USING SHODAN AND CENSYS TOOLS
Journal: International Journal of Advanced Research (Vol.10, No. 11)Publication Date: 2022-11-15
Authors : Lucas Correa Goncalves Jaqueline Silva De Souza Pinheiro; Jean Mark Lobo De Oliveira;
Page : 1306-1317
Keywords : Vulnerabilities Internet of Things Security;
Abstract
The present study on the vulnerabilities that concern The Internet of Things technology was carried out in order to identify which flaws are present in ubiquitous computing devices in the national scenario, attaching evidence that was found when using the search engines Shodan and Censys, which act on the web in order to find security flaws that are evident. After verification, a document was developed in the form web format, with the evidence found, using questions that instigate the interviewee about the knowledge he has about the failures found, whether he has any practice to protect his devices that are connected to the network and if it occurred to have experienced some experience of data theft or invasion of their devices. Thus, with quantitative data collected in both surveys, we can have a survey of how the deficiency of the security practice affects the defense of devices that are part of the Internet of Things.
Other Latest Articles
- SOFTWARE PROJECT SCHEDULINGANALYSIS
- IMPACT OF M-BANKING ON THE PROFITABILITY OF COMMERCIAL BANKS IN INDIA
- ANAESTHESIA MANAGEMENT IN PATIENT WITH LOW EJECTION FRACTION
- THE ROLE OF PHARMACISTS IN MINIMIZING MEDICATION ERRORS IN THE NEONATAL INTENSIVE CARE UNIT: A SYSTEMATIC REVIEW
- IMPACTS OF TECHNOLOGY IN MANUAL PROCESSES IN THE MIDST OF ORGANIZATIONAL SECURITY
Last modified: 2022-12-26 21:18:59