• Review Article

    Vulnerability of information, on the Internet of Things

    Vol. 18 No. 3 (2022)
    Published: 2022-09-12
    José Custodio Najar Pacheco
    Fundación Universitaria Juan de Castellanos
    John Alexander Bohada Jaime
    Fundación Universitaria Juan de Castellanos
    Helena Clara Isabel Alemán Novoa
    Fundación Universitaria Juan de Castellanos

    Introduction: This article is a product of the review of the "Vulnerability of information, on the Internet of Things", developed from the Juan de Castellanos University Foundation in 2021.

    Methods: Review of articles and relevant literature on the exposure of information and some vulnerabilities in devices that are part of the Internet of Things (IoT).

    Results: Information, as one of the most valuable assets, is essential, which is why it is important to have technology, devices that are part of the IoT, despite vulnerabilities.

    Conclusions: Keeping information secure has become a challenge, because it is one of the most important assets of any organization. Its manipulation requires many actors and involves many factors, making it is difficult to control and protect. The constant emergence of technology and their applications in various fields, along with their relative ease of use and smaller sizes, have made significant inroads possible; we must accept that they are a part of the IoT.

    Originality: In the bibliographic review of the information, which results from the use of technology, how the IoT is vulnerable and even more so when it is configured with the Internet.

    Limitation: Technology is becoming more and more dependent on it, despite the vulnerabilities of IoT devices and the Internet.

    Keywords: vulnerabilities, firmware, cybercriminals, Mirai, ransomware, internet of things

    How to Cite

    [1]
    J. C. Najar Pacheco, J. A. Bohada Jaime, and H. C. I. Alemán Novoa, “Vulnerability of information, on the Internet of Things”, ing. Solidar, vol. 18, no. 3, pp. 1–17, Sep. 2022, doi: 10.16925/2357-6014.2022.03.07.

    E. V. Cruz, “E. Security,” 14 Noviembre 2016. [Online]. Available: http://revistaesecurity.com/edgar-vasquez-cruz-intel/.

    M. Á. Mendoza, “Welivesecurity,” 04 Enero 2018. [Online]. Available: https://www.welivesecurity.com/la-es/2018/01/04/maximo-historico-vulnerabilidades-2017/.

    G. Aldegani, “iT Sitio,” 17 Octubre 2017. [Online]. Available: https://www.itsitio.com/es/protocolo-wpa2-vulnerable-2/.

    Xalaka Colombia, 27 Marzo 2017. [Online]. Available: https://www.xataka.com/internet-of-things/continuan-los-hackeos-al-internet-de-las-cosas-el-nuevo-blanco-son-las-bombillas-inteligentes.

    J. P. Rey, “ Texnoxplora,” 08 Febrero 2018. [Online]. Available: http://www.lasexta.com/tecnologia-tecnoxplora/internet/cuatro-formas-hackear-casa-conectada_20161117582ee7200cf24c3ff697ebde.html.

    BBC, 17 Octubre 2017. [Online]. Available: https://www.bbc.com/mundo/noticias-41647662.

    C. SALZA, “C net MWC,” 28 Febrero 2018. [Online]. Available: https://www.cnet.com/es/noticias/como-proteger-tu-casa-conectada/

    J. G. Fernández, “Expansión,” 05 Febrero 2018. [Online]. Available: http://www.expansion.com/economia-digital/innovacion/2016/02/05/56b4e55622601de9508b463d.html.

    Semana, 02 Enero 2016. [Online]. Available: https://www.semana.com/tecnologia/articulo/los-riesgos-de-seguridad-de-la-internet-de-las-cosas/458935.

    Dirigentes Digital.Com, 21 Noviembre 2016. [Online]. Available: https://dirigentesdigital.com/hemeroteca/los_riesgos_del_internet_de_las_cosas-KEDD38950.

    I. V, “ Androidpit,” 04 Marzo 2017. [Online]. Available: https://www.androidpit.es/peligros-detras-internet-de-las-cosas-iot.

    M. S. Zavia, “ Gizmodo,” 28 Febrero 2017. [Online]. Available: https://es.gizmodo.com/detectan-medio-millon-de-dispositivos-facilmente-hackea-1792820284

    E. Arcos, “Hipertextual,” 23 Octubre 2016. [Online]. Available: https://hipertextual.com/2016/10/mirai-ddos-internet-cosas.

    E. Security, 14 Marzo 2018. [Online]. Available: http://revistaesecurity.com/el-malware-mirai-omg-acecha-al-internet-de-las-cosas/.

    E. Editorial, “ Reportedigital,” 22 Junio 2016. [Online]. Available: https://reportedigital.com/iot/iot-superar-numero-telefonos-moviles/

    ESET Security Report Latinoamérica 2017, 2017. [Online]. Available: https://www.welivesecurity.com/wp-content/uploads/2017/04/eset-security-report-2017.pdf.

    Ciberamenazas y Tendencias Edición 2017 CCN-CERT I A-16/17, Junio 2017. [Online]. Available: https://www.ccn-cert.cni.es/informes/informes-ccn-cert-publicos/2224-ccn-cert-ia-16-17-ciberamenzas-y-tendencias-edicion-2017/file.html.

    V. Vintegris, “Comunidad Vintegris,” 15 Mayo 2018. [Online]. Available: http://vintegris.info/internet-de-las-cosas-001/.

    Vintegris.info, “ Comunidadvintegris,” 23 Julio 2018. [Online]. Available: http://vintegris.info/iot-cuando-la-seguridad-es-propiedad-de-las-cosas/.

    OpenMind, 05 Diciembre 2016. [Online]. Available: HTTPS://WWW.BBVAOPENMIND.COM/UNA-LLAMADA-DE-ATENCION-PARA-INTERNET-DE-LAS-COSAS/.

    it DiGital Security, Octubre 2017. [Online]. Available: http://www.itdigitalsecurity.es/whitepapers/content-download/7d061b42-bcd4-4d61-aa49-a9bc7cd753ff/it-digital-security-001.pdf.

    Microsoft, 20 Abril 2018. [Online]. Available: https://support.microsoft.com/es-us/help/960859/ms09-042-vulnerability-in-telnet-could-allow-remote-code-execution.

    P. Dubois., “DiarioTi.com,” 10 Abril 2018. [Online]. Available: https://diarioti.com/opinion-internet-de-las-cosas-y-la-seguridad-un-desafio-permanente/107111

    D. S. Espitia, “ Reportedigital,” 20 Julio 2018. [Online]. Available: https://reportedigital.com/iot/seguridad-en-internet-de-las-cosas-claves-proteger-grandes-empresas/.

    J. S. Onofre, “ El Economista,” 08 Julio 2017. [Online]. Available: https://www.eleconomista.com.mx/empresas/El-Internet-de-las-Cosas-y-sus-riesgos-entraran-sin-pedir-permiso-20170708-0022.html.

    secmotic, 31 Mayo 2016. [Online]. Available: https://secmotic.com/internet-de-las-cosas-seguridad/.

    Telefonica, 2015. [Online]. Available: https://www.telefonica.com/documents/23283/5538439/Telef%C3%B3nica_Security_IoT_Spanish.pdf/5137cc8e-e572-44c8-aecd-2f29f3f236be.

    MásQueNegocio, 26 Abril 2017. [Online]. Available: https://www.masquenegocio.com/2017/04/26/asegurar-internet-de-las-cosas/

    Canal Comstor, 13 Febrero 2018. [Online]. Available: https://blogmexico.comstor.com/la-implementacion-del-iot-en-el-sector-salud.

    Gerencia, Abril 2015. [Online]. Available: http://www.emb.cl/gerencia/articulo.mvc?xid=3688&sec=11.

    D. G. Aparicio, “20 minutos,” 12 Abril 2016. [Online]. Available: https://www.20minutos.es/noticia/2718504/0/hacking/internet-de-las-cosas/mundo-hacker/

    S. E. L. C. Karen Rose, “Internet Society,” 17 Abril 2018. [Online]. Available: https://www.internetsociety.org/es/resources/doc/2015/iot-overview.

    Bloggin Zenith, 12 Abril 2018. [Online]. Available: https://blogginzenith.zenithmedia.es/internet-de-las-cosas-en-2018/.

    R. TICbeat, “TICbeat,” 17 Abril 2018. [Online]. Available: http://www.ticbeat.com/seguridad/la-seguridad-sigue-siendo-el-punto-debil-del-internet-de-las-cosas/.

    Aruba a Hewlett Packard Enterprise Company, 2017. [Online]. Available: https://www.arubanetworks.com/es/soluciones/el-internet-de-las-cosas/.

    A. Casas, “Deloitte,” 2017. [Online]. Available: https://www2.deloitte.com/cr/es/pages/risk/articles/cuales-fueron-los-riesgos-tecnologicos-en-2017-y-que-se-espera-para-este-2018.html.

    redseguridad.com, 13 Diciembre 2017. [Online]. Available: http://www.redseguridad.com/que-leer/informes/trend-micro-preve-que-en-2018-los-ciberataques-dependeran-de-las-vulnerabilidades.

    TechTarget, “EducacionIT,” 09 Enero 2018. [Online]. Available: http://blog.educacionit.com/2018/01/09/desafios-de-seguridad-en-internet-de-las-cosas/.

    P. Dubois, “Search Data Center,” Julio 2018. [Online]. Available: https://searchdatacenter.techtarget.com/es/cronica/En-los-dispositivos-de-internet-de-las-cosas-la-seguridad-es-vital.

    J. M. S. Solance, “PublicaTIC,” 01 Diciembre 2015. [Online]. Available: https://blogs.deusto.es/master-informatica/network-connected-devices-internet-of-things-riesgos-parte-2-final/.

    E. Arcos, “Hipertextual,” 21 Julio 2017. [Online]. Available: https://hipertextual.com/2017/07/nuestro-futuro-cercano-que-internet-cosas-se-vuelve-peligroso.

    Intereconomia.COM, 09 Octubre 2017. [Online]. Available: https://intereconomia.com/tecnologia/los-dispositivos-inteligentes-utilizados-los-hospitales-objetivo-los-ciberdelincuentes-20171009-1127/.

    Viewnext, 04 Abril 2018. [Online]. Available: https://www.viewnext.com/principales-amenazas-en-seguridad-informatica-2018/.

    C. Vera-Cruz, “TechTarget,” Diciembre 2017. [Online]. Available: https://searchdatacenter.techtarget.com/es/cronica/Amenazas-informaticas-que-acecharan-a-las-empresas-en-2018-y-que-hacer-frente-a-ellas.

    Deloitte, 2017. [Online]. Available: https://www2.deloitte.com/content/dam/Deloitte/pa/Documents/technology/2017_TMT_PredictionsSpanish-Americas_Region.pdf.

    Internet Society, 17 Abril 2018. [Online]. Available: https://www.internetsociety.org/es/resources/2018/iot-security-for-policymakers/.

    A. N.-T. Stock, “TICbeat,” 19 Diciembre 2016. [Online]. Available: http://www.ticbeat.com/seguridad/ransomware-de-las-cosas-2017-informe-eset/.

    J. Sanz, “redseguridad.com,” 22 Enero 2018. [Online]. Available: http://www.redseguridad.com/actualidad/info-tic/las-vulnerabilidades-en-internet-de-la-cosas-aumentaran-en-2018.

    Sotesa Informática y nuevas tecnologías, 25 Enero 2018. [Online]. Available: https://sotesa.com/ciberataques-2018-mas-ransomware-malware-movil/.

    D. JUSTO, “SER,” 23 Abril 2018. [Online]. Available: http://cadenaser.com/ser/2018/04/22/ciencia/1524380027_984529.html.

    J. A. B. J. W. Y. R. M. José Custodio Najar Pacheco, “Vulnerabilities in the internet of things,” Vision electrónica, vol. 13, nº 2, pp. 312 - 321, 2019. https://doi.org/10.14483/22484728.15163

    J. M. Díaz, “Riesgos y vulnerabilidades de la denegación de servicio distribuidos en internet de las cosas,” Revista DelawareBioética y Derecho, nº 46, pp. 85 - 100, 2019. https://doi.org/10.1344/rbd2019.0.27068

    J. M. M. Einar Jhordany Serna Valdivia, 21 Octubre 2020. doi: 10.1109/CIMPS52057.2020.9390153

    J. M. Díaz, “Riesgos y vulnerabilidades de la denegación de servicio distribuidos en internet de las cosas,” Bioética y Derecho, no. 46, pp. 85-100, 2019. doi: https://doi.org/10.1344/rbd2019.0.27068

    M. L. Ruilian Wangy, “Sistema de adquisición de información de fallas de equipos de potencia basado en Internet de las cosas.,” Revista EURASIP sobre redes y comunicaciones inalámbricas, p. 65, 09 Marzo 2021. doi: https://doi.org/10.1186/s13638-021-01942-2

    Jezreel Mejía, Mirna Muñoz, Juan Martinez., “Análisis de seguridad de Internet de las cosas: una revisión sistemática de la literatura, 2016,” International Conference on Software Process Improvement (CIMPS), pp. 1,6, 2016. doi: 10.1109 / CIMPS.2016.7802809

    MÉTRICAS
    ARTICLE VIEWS: 534
    PDF VIEWS: 259
    Metrics
    Metrics Loading ...
    https://plu.mx/plum/a/?doi=10.16925/2357-6014.2022.03.07