One of the many problems facied by users, producers or network owners as well as those
who deal with cybersecurity on a daily basis is the issue of vulnerabilities in Internet
of Things devices. Although the most popular vulnerabilities are often presented to the
general public, the vast majority of them are still known only to cybersecurity specialists,
and not to the users who own the vulnerable device. Consequently, it is the users who
are most likely to be at risk. It is advisable to increase user awareness of the dangers
of owning and using unsecured devices as well as provide access to information about
vulnerabilities. Ideally, we would like to have a single source where information about
vulnerabilities and exploits related to IoT devices would be collected, aggregated and
correlated. Among other things, the article presents various sources of actionable
information as well as an open repository that presents information about vulnerabilities
and exploits in an accessible way.
REFERENCES(3)
1.
Felkner A., Rytel M., A Repository of Actionable Information on the Internet of Things [w:] Proceedings of the 19th International Conference on Wireless Networks and Mobile Systems, t. 1. [Lizbona] 2022.
Janiszewski M., Felkner A., Lewandowski P., Rytel M., Romanowski H., Automatic Actionable Information Processing and Trust Management towards Safer Internet of Things, „Sensors” 2021, t. 21, nr 13.
We process personal data collected when visiting the website. The function of obtaining information about users and their behavior is carried out by voluntarily entered information in forms and saving cookies in end devices. Data, including cookies, are used to provide services, improve the user experience and to analyze the traffic in accordance with the Privacy policy. Data are also collected and processed by Google Analytics tool (more).
You can change cookies settings in your browser. Restricted use of cookies in the browser configuration may affect some functionalities of the website.