首页> 外文会议>International Conference on Inventive Research in Computing Applications >Security Testing Methodology of IoT: Methodology to be followed while IoT Penetration Testing
【24h】

Security Testing Methodology of IoT: Methodology to be followed while IoT Penetration Testing

机译:IOT的安全测试方法:IT inat渗透测试的方法遵循

获取原文

摘要

Internet of Things (IoT) is internetworking of physical devices which will detect, collect, process and exchange data, it is a vast ocean of things that has an IP address which is connected to the internet. The IoT framework desires to connect anyone with anything anywhere. The objective of Internet of things is to plant a successful communication between any types of physical devices at any place using any networking technology. With great advancement of IoT and its increasing implementation in today's world it becomes very important to secure the network to maintain the confidentiality, integrity and authenticity of the IoT network. Security assessment carried out on the IoT network would highlight the weaknesses present in the network. Based on the weaknesses highlighted an appropriate countermeasure should be applied to make it secure. The paper presents IoT Testing methodology needs to be incorporated during or post implementation of IoT technology.
机译:事物互联网(IOT)是互联网的物理设备,它将检测,收集,处理和交换数据,它是具有连接到Internet的IP地址的巨大海洋。物联网框架希望将任何人连接到任何地方。互联网的目的是使用任何网络技术在任何地方进行任何类型物理设备之间的成功沟通。通过IOT的巨大进步及其在当今世界的越来越多的实施方面,确保网络维护物联网网络的机密性,完整性和真实性变得非常重要。在物联网网络上执行的安全评估将突出网络中存在的弱点。基于弱点,突出了应适用适当的对策,以使其安全。本文介绍了IOT测试方法,以期间或在IOT技术的实施期间或发布。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号