Methodology of computer security management for the internet of things

Ivette Mateo Washbrum

Abstract


Introduction. The internet network of things, objects and devices connected to the internet is growing exponentially, due to the fact that the deployment and design of equipment has been carried out in a very diversified way, since there is no Internet standard for IoT things, so it has become cumbersome control and management of computer security in the networks connecting devices to the Internet of things. Objective. To propose the development of a standard protocol for the internet of things, considering the specifications of the existing devices and the current communication technologies, such as those that are in the deployment stage based on 5G.
Based on the standard internet protocol of things, a methodology of risk management and IT security for IoT devices is proposed. Materials and methods. A generalized methodology is proposed, which combines good praxis to manage the risks in a system of connection of intelligent objects to the internet of things, reviewing the main factors of the security of the IoT connection system.


Keywords


Digital education, educational technology, traditional model, learning manager

Full Text:

pdf HTML

References


ALLIANCE CYBER SECURITY. (DICIEMBRE de 2016). https://downloads.cloudsecurityalliance.org/. Obtenido de https://downloads.cloudsecurityalliance.org/assets/research/internet-of- things/future-proofing-the-connected-world.pdf

CASTELLANOS, J. (OCTUBRE de 2017). https://www.exploit-db.com/. Obtenido de https://www.exploit-db.com/docs/spanish/43160-reversing-and-exploiting-iot- devices.pdf

ELIZALDE, D. (DICIEMBRE de 2016). https://techproductmanagement.com/. Obtenido de https://techproductmanagement.com/iot-decision-framework/ENISA. (20 de NOVIEMBRE de 2017). https://www.enisa.europa.eu. Obtenido de https://www.enisa.europa.eu/publications/baseline-security-recommendations- for-iot

IBM.COM. (MAYO de 2017). https://www.ibm.com/. Obtenido de https://www.ibm.com/developerworks/library/iot-trs-secure-iot- solutions1/index.html

INTERNET A.B. (OCTUBRE de 2017). https://tools.ietf.org/. Obtenido de https://tools.ietf.org/html/rfc6347

ISO.ORG. (NOVIEMBRE de 2017). https://www.iso.org. Obtenido de https://www.iso.org/standard/

MICROSOFT.COM. (DICIEMBRE de 2017). https://azure.microsoft.com/. Obtenido de https://azure.microsoft.com/en-us/updates/microsoft-azure-iot-reference- architecture-available/

OWASP.ORG. (ENERO de 2018). https://www.owasp.org. Obtenido de https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project

PALMES. (2010). PDCA: PLANIFICAR, HACER, VERIFICAR, ACTUAR. MADRID: AENOR. ASOCIACION ESPAÑOLA DE NORMALIZACION Y CERTIFICACION. MADRID.

TEJERO, A. (FEBRERO de 2017). https://www.researchgate.net/. Obtenido de https://www.researchgate.net/publication/313400021_Metodologia_de_analisis_d e_riesgos_para_la_mejora_de_la_seguridad_del_Internet_de_las_Cosas_Caso_Sm artwatch?enrichId=rgreq-3bbb99f0acf96b6624d901d73697e9c2- XXX&enrichSource=Y292ZXJQYWdlOzMxMzQwMDAyMTtBUzo

TINAJERO, A. (FEBRERO de 2017). https://www.researchgate.net. Obtenido de https://www.researchgate.net/profile/Alberto_Tejero/publication/313400021_Met odologia_de_analisis_de_riesgos_para_la_mejora_de_la_seguridad_del_Internet_d e_las_Cosas_Caso_Smartwatch/links/589976e34585158bf6f795db/Metodologia- de-analisis-de-riesgos-para-la

VIOLINO, C. (ENERO de 2018). https://www.csoonline.com/. Obtenido de https://www.csoonline.com/article/3043030/security/12-top-cloud-security- threats-for-2018.html




DOI: https://doi.org/10.31876/re.v3i24.424

Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.