원문정보
초록
영어
The various IP-based devices (Sensor network devices, CCTV, etc.) are provided with a specific purpose, recently, IP-based IoT (Internet of Things) devices of collecting information were studied intensively. However, these IoT devices have vulnerability of security because of CPU processing power and small storage capacity. In this paper, we analyze vulnerability of security with the classification of IoT devices and investigate the practice. And we look at the issues of vulnerability of physical security based on results of analysis. Based on this, it provides a baseline about standards of the security level of IP-based devices. Also, looking for the target and studying the ways to take advantage of this standard.
목차
1. Introduction
2. Security Threat of the Device
2.1. Exposure of IP
2.2. Information Exposure of Device
2.3. Initial ID/PW Management
2.4. Concealment of Access Port
3. Vulnerability Level Setting, Actual Application Statistics and Suggestion of Solution
3.1. Vulnerability Level Setting
3.2. Classification of Actual Rating Application and Statistics
3.3. Alternative Security Suggestions
4. Target and Using Ways
4.1. Ensuring Mandatory through Regulations Established
4.2. Information and Guidance Led by the Government’s Office
4.3. Voluntary used by enterprise
4.4. Self-Checking of Individual Users
5. Conclusion
References