Abstract

The present study on the vulnerabilities that concern The Internet of Things technology was carried out in order to identify which flaws are present in ubiquitous computing devices in the national scenario, attaching evidence that was found when using the search engines Shodan and Censys, which act on the web in order to find security flaws that are evident. After verification, a document was developed in the form web format, with the evidence found, using questions that instigate the interviewee about the knowledge he has about the failures found, whether he has any practice to protect his devices that are connected to the network and if it occurred to have experienced some experience of data theft or invasion of their devices. Thus, with quantitative data collected in both surveys, we can have a survey of how the deficiency of the security practice affects the defense of devices that are part of the Internet of Things.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call