ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

STUDY OF VULNERABILITIES IN IOT ENVIRONMENTS USING SHODAN AND CENSYS TOOLS

Journal: International Journal of Advanced Research (Vol.10, No. 11)

Publication Date:

Authors : ; ;

Page : 1306-1317

Keywords : Vulnerabilities Internet of Things Security;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

The present study on the vulnerabilities that concern The Internet of Things technology was carried out in order to identify which flaws are present in ubiquitous computing devices in the national scenario, attaching evidence that was found when using the search engines Shodan and Censys, which act on the web in order to find security flaws that are evident. After verification, a document was developed in the form web format, with the evidence found, using questions that instigate the interviewee about the knowledge he has about the failures found, whether he has any practice to protect his devices that are connected to the network and if it occurred to have experienced some experience of data theft or invasion of their devices. Thus, with quantitative data collected in both surveys, we can have a survey of how the deficiency of the security practice affects the defense of devices that are part of the Internet of Things.

Last modified: 2022-12-26 21:18:59