Show simple item record

dc.contributor.advisorOrtigosa Juárez, Álvaro Manuel 
dc.contributor.authorLaseca Espiga, Miguel
dc.contributor.otherUAM. Departamento de Ingeniería Informáticaes_ES
dc.date.accessioned2019-12-11T10:34:19Z
dc.date.available2019-12-11T10:34:19Z
dc.date.issued2019-10
dc.identifier.urihttp://hdl.handle.net/10486/689526en_US
dc.description.abstractThe following project consists of a guide aimed at professionals in the area of cybersecurity. Its purpose is to help them to better understand and work with IoT (Internet of Things) devices, helping them to test and improve the security of any network with IoT integrated in it. Because of their minimalistic nature, IoT devices can be substantially weak systems, easy to penetrate and crack with treacherous intentions. The increasing presence of the Internet of Things in the everyday life threatens not only individuals but governments and big corporations as well as they grow more vulnerable to many security threats. This guide, thus, responds to the increasing demand of security experts specialized on the IoT. The guide contains a set of techniques and policies with the intention of being used to check the accesibility and vulnerability of any IoT device within a network, as well as to identify the threats they suppose for the user or company involved, the measures needed to correct con gurations in devices and networks, and recommendations for a better protection and behaviour for the clients so they could improve their security in the future. Since this guide is mainly aimed at professional analysts and pentesters it's mainly focused on the detection and taxonomy of IoT security vulnerabilities through a specialized kind of penetration tests, and how to report the weaknesses and threats found. Although the guide itself describes techniques, tools and tips on the topic, it is by no means a step-by-step solution to perform any sort of test on its own, since, as described within the guide, these types of pentests are highly dynamic. However, the guide includes some references to di erent sources to aid the unexperienced reader. This guide describes numerous tools and tests available for the reader in order to perform their work, with some explanations, examples and references so they could study their tools. It also contains information on tools and guidelines useful for the creation of reports for these particular kind of tests.en_US
dc.format.extent59 pág.es_ES
dc.format.mimetypeapplication/pdfen_US
dc.language.isoengen_US
dc.rights.urihttps://creativecommons.org/licenses/by-nc-nd/4.0/
dc.subject.otherguideen_US
dc.subject.othercybersecurityen_US
dc.subject.otherIoTen_US
dc.titleAuditing the iot or how to tame the botnet of thingsen_US
dc.typebachelorThesisen_US
dc.subject.ecienciaInformáticaes_ES
dc.rights.ccReconocimiento – NoComercial – SinObraDerivadaes_ES
dc.rights.accessRightsopenAccessen_US
dc.facultadUAMEscuela Politécnica Superior


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record

https://creativecommons.org/licenses/by-nc-nd/4.0/
Except where otherwise noted, this item's license is described as https://creativecommons.org/licenses/by-nc-nd/4.0/