Tesis
Guía metodológica para el control de vulnerabilidades informáticas en dispositivos IOT (Internet of the Things) para redes HAN (Home Area Network).
Fecha
2021-03-05Registro en:
Mena Galarza, David Rodrigo. (2021). Guía metodológica para el control de vulnerabilidades informáticas en dispositivos IOT (Internet of the Things) para redes HAN (Home Area Network). Escuela Superior Politécnica de Chimborazo. Riobamba.
Autor
Mena Galarza, David Rodrigo
Resumen
The aim of this research was to generate a technical and informative document enclosed in safety computer education that assists as a guide for people in general to promote the correct and safe use of the technologies called IoT "Internet of Things" present in their daily life and at home. Thus, through this guidance framework where, through a security analysis of the main wireless technologies at home, it has been possible to generate information on recommendations and good practices to develop a culture of awareness on the computer risks present in the use of these devices and the appropriate and safe way to implement, configure, and use them. For the development of this study, several research methodologies were applied where data regarding to the operation and vulnerabilities of the wireless technology most present at home were collected, as well as tests of concept and experimentation to demonstrate the existence of these vulnerabilities and the appropriate way to mitigate them. Through the formulation of a survey directed to the administrative personnel of a public entity, it was determined that a significant percentage of them were unaware of basic computer safety aspects of their IoT devices and the appropriate way to handle them for safety use at home. With the results obtained, the importance of having this type of information could be validated through a guide that will allow people to have a better knowledge of security and manage their IoT devices when they access external networks such as the Internet from their home network and prevent your sensitive and private information from being accessible to cybercriminals.