Vulnerability of information, on the Internet of Things
Fundación Universitaria Juan de Castellanos, Grupo de Investigación CIyT, Tunja, Colombia
email: josenajarpiena@gmail.com
Fundación Universitaria Juan de Castellanos, Grupo de Investigación CIyT, Tunja, Colombia
email: bohada@jdc.edu.co
Fundación Universitaria Juan de Castellanos. CvLAC: https://scienti.minciencias.gov.co/cvlac/visualizador/generarCurriculoCv.do?-cod_rh=0001038923
email: haleman@jdc.edu.co
Introduction: This article is a product of the review of the "Vulnerability of information, on the Internet of Things", developed from the Juan de Castellanos University Foundation in 2021.
Methods: Review of articles and relevant literature on the exposure of information and some vulnerabilities in devices that are part of the Internet of Things (IoT).
Results: Information, as one of the most valuable assets, is essential, which is why it is important to have technology, devices that are part of the IoT, despite vulnerabilities.
Conclusions: Keeping information secure has become a challenge, because it is one of the most important assets of any organization. Its manipulation requires many actors and involves many factors, making it is difficult to control and protect. The constant emergence of technology and their applications in various fields, along with their relative ease of use and smaller sizes, have made significant inroads possible; we must accept that they are a part of the IoT.
Originality: In the bibliographic review of the information, which results from the use of technology, how the IoT is vulnerable and even more so when it is configured with the Internet.
Limitation: Technology is becoming more and more dependent on it, despite the vulnerabilities of IoT devices and the Internet.
E. V. Cruz, “E. Security,” 14 Noviembre 2016. [Online]. Available: http://revistaesecurity.com/edgar-vasquez-cruz-intel/.
M. Á. Mendoza, “Welivesecurity,” 04 Enero 2018. [Online]. Available: https://www.welivesecurity.com/la-es/2018/01/04/maximo-historico-vulnerabilidades-2017/.
G. Aldegani, “iT Sitio,” 17 Octubre 2017. [Online]. Available: https://www.itsitio.com/es/protocolo-wpa2-vulnerable-2/.
Xalaka Colombia, 27 Marzo 2017. [Online]. Available: https://www.xataka.com/internet-of-things/continuan-los-hackeos-al-internet-de-las-cosas-el-nuevo-blanco-son-las-bombillas-inteligentes.
J. P. Rey, “ Texnoxplora,” 08 Febrero 2018. [Online]. Available: http://www.lasexta.com/tecnologia-tecnoxplora/internet/cuatro-formas-hackear-casa-conectada_20161117582ee7200cf24c3ff697ebde.html.
BBC, 17 Octubre 2017. [Online]. Available: https://www.bbc.com/mundo/noticias-41647662.
C. SALZA, “C net MWC,” 28 Febrero 2018. [Online]. Available: https://www.cnet.com/es/noticias/como-proteger-tu-casa-conectada/
J. G. Fernández, “Expansión,” 05 Febrero 2018. [Online]. Available: http://www.expansion.com/economia-digital/innovacion/2016/02/05/56b4e55622601de9508b463d.html.
Semana, 02 Enero 2016. [Online]. Available: https://www.semana.com/tecnologia/articulo/los-riesgos-de-seguridad-de-la-internet-de-las-cosas/458935.
Dirigentes Digital.Com, 21 Noviembre 2016. [Online]. Available: https://dirigentesdigital.com/hemeroteca/los_riesgos_del_internet_de_las_cosas-KEDD38950.
I. V, “ Androidpit,” 04 Marzo 2017. [Online]. Available: https://www.androidpit.es/peligros-detras-internet-de-las-cosas-iot.
M. S. Zavia, “ Gizmodo,” 28 Febrero 2017. [Online]. Available: https://es.gizmodo.com/detectan-medio-millon-de-dispositivos-facilmente-hackea-1792820284
E. Arcos, “Hipertextual,” 23 Octubre 2016. [Online]. Available: https://hipertextual.com/2016/10/mirai-ddos-internet-cosas.
E. Security, 14 Marzo 2018. [Online]. Available: http://revistaesecurity.com/el-malware-mirai-omg-acecha-al-internet-de-las-cosas/.
E. Editorial, “ Reportedigital,” 22 Junio 2016. [Online]. Available: https://reportedigital.com/iot/iot-superar-numero-telefonos-moviles/
ESET Security Report Latinoamérica 2017, 2017. [Online]. Available: https://www.welivesecurity.com/wp-content/uploads/2017/04/eset-security-report-2017.pdf.
Ciberamenazas y Tendencias Edición 2017 CCN-CERT I A-16/17, Junio 2017. [Online]. Available: https://www.ccn-cert.cni.es/informes/informes-ccn-cert-publicos/2224-ccn-cert-ia-16-17-ciberamenzas-y-tendencias-edicion-2017/file.html.
V. Vintegris, “Comunidad Vintegris,” 15 Mayo 2018. [Online]. Available: http://vintegris.info/internet-de-las-cosas-001/.
Vintegris.info, “ Comunidadvintegris,” 23 Julio 2018. [Online]. Available: http://vintegris.info/iot-cuando-la-seguridad-es-propiedad-de-las-cosas/.
OpenMind, 05 Diciembre 2016. [Online]. Available: HTTPS://WWW.BBVAOPENMIND.COM/UNA-LLAMADA-DE-ATENCION-PARA-INTERNET-DE-LAS-COSAS/.
it DiGital Security, Octubre 2017. [Online]. Available: http://www.itdigitalsecurity.es/whitepapers/content-download/7d061b42-bcd4-4d61-aa49-a9bc7cd753ff/it-digital-security-001.pdf.
Microsoft, 20 Abril 2018. [Online]. Available: https://support.microsoft.com/es-us/help/960859/ms09-042-vulnerability-in-telnet-could-allow-remote-code-execution.
P. Dubois., “DiarioTi.com,” 10 Abril 2018. [Online]. Available: https://diarioti.com/opinion-internet-de-las-cosas-y-la-seguridad-un-desafio-permanente/107111
D. S. Espitia, “ Reportedigital,” 20 Julio 2018. [Online]. Available: https://reportedigital.com/iot/seguridad-en-internet-de-las-cosas-claves-proteger-grandes-empresas/.
J. S. Onofre, “ El Economista,” 08 Julio 2017. [Online]. Available: https://www.eleconomista.com.mx/empresas/El-Internet-de-las-Cosas-y-sus-riesgos-entraran-sin-pedir-permiso-20170708-0022.html.
secmotic, 31 Mayo 2016. [Online]. Available: https://secmotic.com/internet-de-las-cosas-seguridad/.
Telefonica, 2015. [Online]. Available: https://www.telefonica.com/documents/23283/5538439/Telef%C3%B3nica_Security_IoT_Spanish.pdf/5137cc8e-e572-44c8-aecd-2f29f3f236be.
MásQueNegocio, 26 Abril 2017. [Online]. Available: https://www.masquenegocio.com/2017/04/26/asegurar-internet-de-las-cosas/
Canal Comstor, 13 Febrero 2018. [Online]. Available: https://blogmexico.comstor.com/la-implementacion-del-iot-en-el-sector-salud.
Gerencia, Abril 2015. [Online]. Available: http://www.emb.cl/gerencia/articulo.mvc?xid=3688&sec=11.
D. G. Aparicio, “20 minutos,” 12 Abril 2016. [Online]. Available: https://www.20minutos.es/noticia/2718504/0/hacking/internet-de-las-cosas/mundo-hacker/
S. E. L. C. Karen Rose, “Internet Society,” 17 Abril 2018. [Online]. Available: https://www.internetsociety.org/es/resources/doc/2015/iot-overview.
Bloggin Zenith, 12 Abril 2018. [Online]. Available: https://blogginzenith.zenithmedia.es/internet-de-las-cosas-en-2018/.
R. TICbeat, “TICbeat,” 17 Abril 2018. [Online]. Available: http://www.ticbeat.com/seguridad/la-seguridad-sigue-siendo-el-punto-debil-del-internet-de-las-cosas/.
Aruba a Hewlett Packard Enterprise Company, 2017. [Online]. Available: https://www.arubanetworks.com/es/soluciones/el-internet-de-las-cosas/.
A. Casas, “Deloitte,” 2017. [Online]. Available: https://www2.deloitte.com/cr/es/pages/risk/articles/cuales-fueron-los-riesgos-tecnologicos-en-2017-y-que-se-espera-para-este-2018.html.
redseguridad.com, 13 Diciembre 2017. [Online]. Available: http://www.redseguridad.com/que-leer/informes/trend-micro-preve-que-en-2018-los-ciberataques-dependeran-de-las-vulnerabilidades.
TechTarget, “EducacionIT,” 09 Enero 2018. [Online]. Available: http://blog.educacionit.com/2018/01/09/desafios-de-seguridad-en-internet-de-las-cosas/.
P. Dubois, “Search Data Center,” Julio 2018. [Online]. Available: https://searchdatacenter.techtarget.com/es/cronica/En-los-dispositivos-de-internet-de-las-cosas-la-seguridad-es-vital.
J. M. S. Solance, “PublicaTIC,” 01 Diciembre 2015. [Online]. Available: https://blogs.deusto.es/master-informatica/network-connected-devices-internet-of-things-riesgos-parte-2-final/.
E. Arcos, “Hipertextual,” 21 Julio 2017. [Online]. Available: https://hipertextual.com/2017/07/nuestro-futuro-cercano-que-internet-cosas-se-vuelve-peligroso.
Intereconomia.COM, 09 Octubre 2017. [Online]. Available: https://intereconomia.com/tecnologia/los-dispositivos-inteligentes-utilizados-los-hospitales-objetivo-los-ciberdelincuentes-20171009-1127/.
Viewnext, 04 Abril 2018. [Online]. Available: https://www.viewnext.com/principales-amenazas-en-seguridad-informatica-2018/.
C. Vera-Cruz, “TechTarget,” Diciembre 2017. [Online]. Available: https://searchdatacenter.techtarget.com/es/cronica/Amenazas-informaticas-que-acecharan-a-las-empresas-en-2018-y-que-hacer-frente-a-ellas.
Deloitte, 2017. [Online]. Available: https://www2.deloitte.com/content/dam/Deloitte/pa/Documents/technology/2017_TMT_PredictionsSpanish-Americas_Region.pdf.
Internet Society, 17 Abril 2018. [Online]. Available: https://www.internetsociety.org/es/resources/2018/iot-security-for-policymakers/.
A. N.-T. Stock, “TICbeat,” 19 Diciembre 2016. [Online]. Available: http://www.ticbeat.com/seguridad/ransomware-de-las-cosas-2017-informe-eset/.
J. Sanz, “redseguridad.com,” 22 Enero 2018. [Online]. Available: http://www.redseguridad.com/actualidad/info-tic/las-vulnerabilidades-en-internet-de-la-cosas-aumentaran-en-2018.
Sotesa Informática y nuevas tecnologías, 25 Enero 2018. [Online]. Available: https://sotesa.com/ciberataques-2018-mas-ransomware-malware-movil/.
D. JUSTO, “SER,” 23 Abril 2018. [Online]. Available: http://cadenaser.com/ser/2018/04/22/ciencia/1524380027_984529.html.
J. A. B. J. W. Y. R. M. José Custodio Najar Pacheco, “Vulnerabilities in the internet of things,” Vision electrónica, vol. 13, nº 2, pp. 312 - 321, 2019. https://doi.org/10.14483/22484728.15163
J. M. Díaz, “Riesgos y vulnerabilidades de la denegación de servicio distribuidos en internet de las cosas,” Revista DelawareBioética y Derecho, nº 46, pp. 85 - 100, 2019. https://doi.org/10.1344/rbd2019.0.27068
J. M. M. Einar Jhordany Serna Valdivia, 21 Octubre 2020. doi: 10.1109/CIMPS52057.2020.9390153
J. M. Díaz, “Riesgos y vulnerabilidades de la denegación de servicio distribuidos en internet de las cosas,” Bioética y Derecho, no. 46, pp. 85-100, 2019. doi: https://doi.org/10.1344/rbd2019.0.27068
M. L. Ruilian Wangy, “Sistema de adquisición de información de fallas de equipos de potencia basado en Internet de las cosas.,” Revista EURASIP sobre redes y comunicaciones inalámbricas, p. 65, 09 Marzo 2021. doi: https://doi.org/10.1186/s13638-021-01942-2
Jezreel Mejía, Mirna Muñoz, Juan Martinez., “Análisis de seguridad de Internet de las cosas: una revisión sistemática de la literatura, 2016,” International Conference on Software Process Improvement (CIMPS), pp. 1,6, 2016. doi: 10.1109 / CIMPS.2016.7802809
Copyright (c) 2022 Ingeniería Solidaria

This work is licensed under a Creative Commons Attribution 4.0 International License.
Cession of rights and ethical commitment
As the author of the article, I declare that is an original unpublished work exclusively created by me, that it has not been submitted for simultaneous evaluation by another publication and that there is no impediment of any kind for concession of the rights provided for in this contract.
In this sense, I am committed to await the result of the evaluation by the journal Ingeniería Solidaría before considering its submission to another medium; in case the response by that publication is positive, additionally, I am committed to respond for any action involving claims, plagiarism or any other kind of claim that could be made by third parties.
At the same time, as the author or co-author, I declare that I am completely in agreement with the conditions presented in this work and that I cede all patrimonial rights, in other words, regarding reproduction, public communication, distribution, dissemination, transformation, making it available and all forms of exploitation of the work using any medium or procedure, during the term of the legal protection of the work and in every country in the world, to the Universidad Cooperativa de Colombia Press.