ยินดีต้อนรับคุณ, บุคคลทั่วไป
หน้าหลัก | เข้าสู่ระบบ หรือ ลงทะเบียน
Username: Password:
  วันอาทิตย์ที่ 14 สิงหาคม พ.ศ.2565
  คำค้นหา:
รีวิวเกมจากแฟน GM
รีวิวเกม
สาระน่าเรื่องเกม
บทความเกม
Gamemag online รายสิบวัน
Magazine
Screen Shot
Game Update
คลิปเกมจากยูทูป
Game Tube
Emu และ Rom เกม
Emu&rom
Cosplay
Cosplay
Wallpaper
WallPaper
ภาพวาดจากแฟน GM
Art Corner
Gamemag on Facebook
Facebook
                   
สมาชิกทุกท่านโปรดอ่านก่อน*กฎกติกาของบอร์ด*
รวมวิธีโพสภาพ,คลิป,การใส่ลายเซ็น และอื่นๆ
...
Animategroup.com - GAMEMAG - Inside the Smart Home: IoT Device Threats and Attack Scenarios
ผู้ตั้งกระทู้ ข้อความ
upamfva / Member
ID : M07665

Level : ลูกเจี๊ยบฝึกหัด
Exp. : -52%
จิตพิสัย : -71%
Like : 0
Post : 470
Reply : 13
Sex : ชาย
วันที่สมัคร : 2021-06-11
PM Profile
Topic : Inside the Smart Home: IoT Device Threats and Attack Scenarios
«date: 18 เมษายน 2565 , 08:27:11 »
 แก้ไข  

Inside the Smart Home: IoT Device Threats and Attack Scenarios



A smart home is made up of a number of different devices connected to the internet of things (IoT), each with a specific set of functions. No matter how different these devices are from one another, they have the shared goal of streamlining the tasks and simplifying the lives of their users. Together they paint an enticing image of comfort and convenience. However, just as these devices have revolutionized home living, they have also given rise to new complications for home security.To get more news about smart home accessories, you can visit securamsys.com official website.

We detail different smart home attack scenarios and discuss the different attack layers of IoT devices in our paper, "IoT Device Security: Locking Out Risks and Threats to Smart Homes." Here we give an overview of the possible attack scenarios for various smart home devices and suggest security solutions.
A smart home gives users extensive access to many aspects of their home, even from a remote location. For example, users can monitor their home in real time through a mobile app or web interface. They can also initiate certain actions remotely, such as communicating with their children using a smart toy or unlocking a smart lock for a trusted friend.

Smart home devices also provide automatic and chained functions that can make day-to-day living more convenient for users. For example, in the morning the smart coffee maker starts brewing before the users need to get up for work. Once the users are in the kitchen, the smart refrigerator alerts them that they are low on supplies, if it has not yet ordered the needed items. As the users go out the door, the smart lock automatically locks behind them. And now that the house is empty, the smart robot vacuum cleaner starts its scheduled cleaning.

This scenario and plenty of others are possible if users have good control and visibility over the deployed devices in their smart homes. But problems arise if this control and visibility, unbeknown to the users, shift to malicious actors.
Existing vulnerabilities, poor configuration, and the use of default passwords are among the factors that can aid a hacker in compromising at least one device in a smart home system. Once a single device is compromised, hackers can take a number of actions based on the capabilities and functions of the device. We illustrate some of them here.

Starting from the front door, there can be a smart lock. If compromised, the smart lock can give hackers control over who comes in or out of the house. The most obvious action available for hackers, then, would be to let intruders or accomplices in to the house, and another would be to lock out the actual residents.

Inside the living room, several other devices can be set up. One of these can be a smart speaker, which serves as the conduit for voice-initiated home automation commands. If compromised, a voice-activated device such as a smart speaker can allow hackers to issue voice commands of their own.

In the kitchen, devices like a smart refrigerator and a smart coffee maker can cause major issues if successfully hacked. Hackers can set up a smart refrigerator to register wrong expiration dates or order an immense amount of groceries online. And even a smart coffee maker can cause great inconvenience if commanded by hackers to brew coffee incessantly.


   ip: 104.233.231.177 
...

ผู้ใช้งานขณะนี้มีผู้ออนไลน์ 10 คน บอรด์มีทั้งหมด : 6,098 กระทู้ รวม  : 29,577 คำตอบ เข้าอ่านกระทู้ทั้งหมด : 12,568,331 ครั้ง
ดูตอบกระทู้ล่าสุดบนบอร์ด

0ขาจร, 10สาวก
ผู้ใช้เมื่อ 5 นาทีที่ผ่านมา:
, , , , , , , , , ,

HBD : pae781452 ,

 

Copyright 2007 Animate Group Co.,Ltd. All rights reserved.