Methodology of computer security management for the internet of things

Main Article Content

Ivette Mateo Washbrum
http://orcid.org/0000-0002-7523-7219

Abstract

Introduction. The internet network of things, objects and devices connected to the internet is growing exponentially, due to the fact that the deployment and design of equipment has been carried out in a very diversified way, since there is no Internet standard for IoT things, so it has become cumbersome control and management of computer security in the networks connecting devices to the Internet of things. Objective. To propose the development of a standard protocol for the internet of things, considering the specifications of the existing devices and the current communication technologies, such as those that are in the deployment stage based on 5G.
Based on the standard internet protocol of things, a methodology of risk management and IT security for IoT devices is proposed. Materials and methods. A generalized methodology is proposed, which combines good praxis to manage the risks in a system of connection of intelligent objects to the internet of things, reviewing the main factors of the security of the IoT connection system.

Downloads

Download data is not yet available.

Article Details

How to Cite
Washbrum, I. M. (2019). Methodology of computer security management for the internet of things. Espirales Revista Multidisciplinaria De investigación, 3(24), 69–76. https://doi.org/10.31876/re.v3i24.424
Issue
Section
Artículos
Author Biography

Ivette Mateo Washbrum, Docente de la Carrera de Redes, ITSVR

Ingeniera en Electrónica y Telecomunicaciones, Master en Ingeniería de Software y Sistemas Informáticos

Share |

References

ALLIANCE CYBER SECURITY. (DICIEMBRE de 2016). https://downloads.cloudsecurityalliance.org/. Obtenido de https://downloads.cloudsecurityalliance.org/assets/research/internet-of- things/future-proofing-the-connected-world.pdf

CASTELLANOS, J. (OCTUBRE de 2017). https://www.exploit-db.com/. Obtenido de https://www.exploit-db.com/docs/spanish/43160-reversing-and-exploiting-iot- devices.pdf

ELIZALDE, D. (DICIEMBRE de 2016). https://techproductmanagement.com/. Obtenido de https://techproductmanagement.com/iot-decision-framework/ENISA. (20 de NOVIEMBRE de 2017). https://www.enisa.europa.eu. Obtenido de https://www.enisa.europa.eu/publications/baseline-security-recommendations- for-iot

IBM.COM. (MAYO de 2017). https://www.ibm.com/. Obtenido de https://www.ibm.com/developerworks/library/iot-trs-secure-iot- solutions1/index.html

INTERNET A.B. (OCTUBRE de 2017). https://tools.ietf.org/. Obtenido de https://tools.ietf.org/html/rfc6347

ISO.ORG. (NOVIEMBRE de 2017). https://www.iso.org. Obtenido de https://www.iso.org/standard/

MICROSOFT.COM. (DICIEMBRE de 2017). https://azure.microsoft.com/. Obtenido de https://azure.microsoft.com/en-us/updates/microsoft-azure-iot-reference- architecture-available/

OWASP.ORG. (ENERO de 2018). https://www.owasp.org. Obtenido de https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project

PALMES. (2010). PDCA: PLANIFICAR, HACER, VERIFICAR, ACTUAR. MADRID: AENOR. ASOCIACION ESPAÑOLA DE NORMALIZACION Y CERTIFICACION. MADRID.

TEJERO, A. (FEBRERO de 2017). https://www.researchgate.net/. Obtenido de https://www.researchgate.net/publication/313400021_Metodologia_de_analisis_d e_riesgos_para_la_mejora_de_la_seguridad_del_Internet_de_las_Cosas_Caso_Sm artwatch?enrichId=rgreq-3bbb99f0acf96b6624d901d73697e9c2- XXX&enrichSource=Y292ZXJQYWdlOzMxMzQwMDAyMTtBUzo

TINAJERO, A. (FEBRERO de 2017). https://www.researchgate.net. Obtenido de https://www.researchgate.net/profile/Alberto_Tejero/publication/313400021_Met odologia_de_analisis_de_riesgos_para_la_mejora_de_la_seguridad_del_Internet_d e_las_Cosas_Caso_Smartwatch/links/589976e34585158bf6f795db/Metodologia- de-analisis-de-riesgos-para-la

VIOLINO, C. (ENERO de 2018). https://www.csoonline.com/. Obtenido de https://www.csoonline.com/article/3043030/security/12-top-cloud-security- threats-for-2018.html