Segurança da informação em IOT
Technological advances are unquestionable, increasingly present day to day, modifying people's behavior, shopping, interacting, making friends, watching movies, reading news, and especially how to get informed. Today the Internet has stopped connecting only computers, to connect people, the evo...
Autor principal: | Fukuda, Leonardo Massami |
---|---|
Formato: | Trabalho de Conclusão de Curso (Especialização) |
Idioma: | Português |
Publicado em: |
Universidade Tecnológica Federal do Paraná
2020
|
Assuntos: | |
Acesso em linha: |
http://repositorio.utfpr.edu.br/jspui/handle/1/19442 |
Tags: |
Adicionar Tag
Sem tags, seja o primeiro a adicionar uma tag!
|
Resumo: |
Technological advances are unquestionable, increasingly present day to day, modifying people's behavior, shopping, interacting, making friends, watching movies, reading news, and especially how to get informed. Today the Internet has stopped connecting only computers, to connect people, the evolution of technologies allows this connectivity in many types of devices, the "Internet of Things", facilitating interaction and generating huge benefits for the population. This present study aims to analyze fundamental points about the Internet of Things Internet, its technology, advantages and disadvantages. This analysis on IoT will be measured by Information Security, where it is sought a reflection on the vulnerability and safety criteria in the IOT. In 60 seconds you know it resulted in 3.8 Million searches on Google, 3.3 Million Facebook Posts, 29 Million messages sent via Whatsapp, 448,800 Twitter Tweets, 65,972 Instagram Photo uploads, 149,513 emails sent, 500 hours upload videos on Youtube, and 1,440 posts on Wordpress, with all this information the motivation is clear in knowing how Information Security is prepared for the amount of information to travel between devices and people if we are sure to produce that amount content to the Internet. Analyze the efficiency of Internet Information Security of Things, understanding about Information Security in connection devices. Mapping the security vulnerabilities in IoT, knowing the mechanisms of operation on the forms and advantages offered by IoT, reflecting on the indicators of Information Security in the infrastructure that use this technology. Exploratory research will be used as a guiding instrument to identify the pertinent facts of the study objective that will be the basis for future work, in order to reconcile the scientific knowledge, the reality practiced, seeking results. Considering that the proposal of this study is not to present solutions for Information Security in IoT, but to carry out an analysis of information security criteria in IoT connection environments, we have used several bibliographical references, where authors with important literary contributions have been surveyed, were analyzed and guided the study in question. The realization of this work allowed, analyze and measure the use of new technologies, understanding the origin, and their dissemination, as well as the advantages, of the internet of things, it is possible to know in a deeper level their problems and barriers. Thanks to the contribution of several authors and their works, we note that IoT is undoubtedly the great leap of technologies and innovations. Its results are of high relevance and improvement to the quality of life of individuals and corporations, it was also possible to carry out a broad reflection on the important role of Information Security, the benefits that its application can offer to IoT users. In this way, the present study is satisfactorily completed by the importance of investigating two areas with such a powerful evolution and application, fundamental in the contemporary world, which are Information Security and the Internet of Things. more and more benefits and quality of life in the personal and professional sectors, and above all, a great growth of IoT is expected, with full confidence offered by Information Security. |
---|