Methodology of computer security management for the internet of things
Main Article Content
Abstract
Introduction. The internet network of things, objects and devices connected to the internet is growing exponentially, due to the fact that the deployment and design of equipment has been carried out in a very diversified way, since there is no Internet standard for IoT things, so it has become cumbersome control and management of computer security in the networks connecting devices to the Internet of things. Objective. To propose the development of a standard protocol for the internet of things, considering the specifications of the existing devices and the current communication technologies, such as those that are in the deployment stage based on 5G.
Based on the standard internet protocol of things, a methodology of risk management and IT security for IoT devices is proposed. Materials and methods. A generalized methodology is proposed, which combines good praxis to manage the risks in a system of connection of intelligent objects to the internet of things, reviewing the main factors of the security of the IoT connection system.
Downloads
Article Details

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
This journal provides free access to its content through its website, under the principle of making research freely available to the public and supporting global knowledge exchange.
The journal acknowledges the Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License (CC BY-NC-SA 4.0) https://creativecommons.org/licenses/by-nc-sa/4.0/deed.es
The journal allows any user to read, download, copy, distribute, or print the scholarly work published herein without financial, legal, or technical barriers, for the purpose of using the information for any responsible purpose with appropriate acknowledgment of authorship.
References
ALLIANCE CYBER SECURITY. (DICIEMBRE de 2016). https://downloads.cloudsecurityalliance.org/. Obtenido de https://downloads.cloudsecurityalliance.org/assets/research/internet-of- things/future-proofing-the-connected-world.pdf
CASTELLANOS, J. (OCTUBRE de 2017). https://www.exploit-db.com/. Obtenido de https://www.exploit-db.com/docs/spanish/43160-reversing-and-exploiting-iot- devices.pdf
ELIZALDE, D. (DICIEMBRE de 2016). https://techproductmanagement.com/. Obtenido de https://techproductmanagement.com/iot-decision-framework/ENISA. (20 de NOVIEMBRE de 2017). https://www.enisa.europa.eu. Obtenido de https://www.enisa.europa.eu/publications/baseline-security-recommendations- for-iot
IBM.COM. (MAYO de 2017). https://www.ibm.com/. Obtenido de https://www.ibm.com/developerworks/library/iot-trs-secure-iot- solutions1/index.html
INTERNET A.B. (OCTUBRE de 2017). https://tools.ietf.org/. Obtenido de https://tools.ietf.org/html/rfc6347
ISO.ORG. (NOVIEMBRE de 2017). https://www.iso.org. Obtenido de https://www.iso.org/standard/
MICROSOFT.COM. (DICIEMBRE de 2017). https://azure.microsoft.com/. Obtenido de https://azure.microsoft.com/en-us/updates/microsoft-azure-iot-reference- architecture-available/
OWASP.ORG. (ENERO de 2018). https://www.owasp.org. Obtenido de https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project
PALMES. (2010). PDCA: PLANIFICAR, HACER, VERIFICAR, ACTUAR. MADRID: AENOR. ASOCIACION ESPAÑOLA DE NORMALIZACION Y CERTIFICACION. MADRID.
TEJERO, A. (FEBRERO de 2017). https://www.researchgate.net/. Obtenido de https://www.researchgate.net/publication/313400021_Metodologia_de_analisis_d e_riesgos_para_la_mejora_de_la_seguridad_del_Internet_de_las_Cosas_Caso_Sm artwatch?enrichId=rgreq-3bbb99f0acf96b6624d901d73697e9c2- XXX&enrichSource=Y292ZXJQYWdlOzMxMzQwMDAyMTtBUzo
TINAJERO, A. (FEBRERO de 2017). https://www.researchgate.net. Obtenido de https://www.researchgate.net/profile/Alberto_Tejero/publication/313400021_Met odologia_de_analisis_de_riesgos_para_la_mejora_de_la_seguridad_del_Internet_d e_las_Cosas_Caso_Smartwatch/links/589976e34585158bf6f795db/Metodologia- de-analisis-de-riesgos-para-la
VIOLINO, C. (ENERO de 2018). https://www.csoonline.com/. Obtenido de https://www.csoonline.com/article/3043030/security/12-top-cloud-security- threats-for-2018.html