Mostrar el registro sencillo del ítem
IoT Vulnerabilities in SCADA Systems
dc.rights.license | All rights reserved | en_US |
dc.contributor.advisor | Duffany, Jeffrey | |
dc.contributor.author | Rivera Barbosa, Jose | |
dc.date.accessioned | 2020-09-16T15:03:11Z | |
dc.date.available | 2020-09-16T15:03:11Z | |
dc.date.issued | 2016 | |
dc.identifier.citation | Rivera Barbosa, J. (2016). IoT vulnerabilities in SCADA systems [Unpublished manuscript]. Graduate School, Polytechnic University of Puerto Rico. | en_US |
dc.identifier.uri | http://hdl.handle.net/20.500.12475/596 | |
dc.description | Design Project Article for the Graduate Programs at Polytechnic University of Puerto Rico | en_US |
dc.description.abstract | The emerging technologies like Internet of Things (IoT) is an infrastructure of interconnected objects, people, systems and information resources together with intelligent services to allow them to process information of the physical and the virtual world and react. With this possibility the Supervisory Control and Data Acquisition (SCADA) have been taken to this level. SCADA provides management with live data on production operations, implementing effective controls, and reduces costs of operation. Most consumers and vendors may or may not be aware or probably haven’t realized the greater threats that are out there in the cyber world. By Applying security standards and best practices we may be able maintain and enhanced on minimizing the risk by using all available tools that are out there. The internet has grown a lot since the beginning and there are powerful tools out there that are accessible and resourceful from a novice level to experience Security Professional. This project will demonstrate how easy it’s to find the vulnerabilities on IoT devices that are connected to SCADA systems. To produce this finding we will use the following search engines: SHODAN.io and CENSYS.io that search and extract worldwide data from devices that are currently connected to the internet. Ones identified a security issue; a security analyst can establish a corrective action plan to prevent future security flaws by applying security standards and best industries practices. Key Terms - Internet of Things, IoT, SCADA, Vulnerabilities. | en_US |
dc.language.iso | en_US | en_US |
dc.publisher | Polytechnic University of Puerto Rico | en_US |
dc.relation.ispartof | Computer Science; | |
dc.relation.ispartofseries | Winter-2016; | |
dc.relation.haspart | San Juan | en_US |
dc.subject.lcsh | Supervisory control systems | en_US |
dc.subject.lcsh | Internet of things | |
dc.subject.lcsh | Polytechnic University of Puerto Rico--Graduate students--Research | |
dc.title | IoT Vulnerabilities in SCADA Systems | en_US |
dc.type | Article | en_US |
dc.rights.holder | Polytechnic University of Puerto Rico, Graduate School | en_US |
Ficheros en el ítem
Este ítem aparece en la(s) siguiente(s) colección(ones)
-
Computer Science
Artículos de Proyectos de Ciencias en Computadoras