Abstract

The Internet of Things has allowed the connection of a countless number of devices, which has facilitated control and even decision-making by them, but at the same time security vulnerabilities in operating systems, wireless security protocols, its applications, as well as the vulnerabilities in IoT, acronym in English of Internet of Things, devices, have allowed considerable sums of money to be paid to health institutions and patients for allowing the functionality of their equipment, according to security experts the world is facing a perfect storm which can allows attacks and system hijackings increasing in number, volume and gravity, since when adding more devices, they become access doors for intruders. However, it is important to be aware that everything that connects to the Internet is vulnerable; it has been demonstrated since birth, as well as the IoT.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call