Matches in SemOpenAlex for { <https://semopenalex.org/work/W4320506536> ?p ?o ?g. }
Showing items 1 to 42 of
42
with 100 items per page.
- W4320506536 abstract "The significant development of single-board computers today can create many different threats to information security. These devices open up new opportunities for attackers, as they allow them to find new ways to carry out attacks. Since SBCs are often small in physical size, but have the processing power to run full Linux distributions, combined with a variety of different external interfaces, this allows you to create devices that can listen to sound, photo and video recording, and intercept network traffic. Methods and ways to prevent such violations of information security have not been fully compiled. The use of single-board computers as a tool for violating information security has already been carried out in real conditions. This confirms the urgency of the problem. This is due to the fact that these devices have increased energy efficiency, universal software, low cost, as well as ways to work in difficult environmental conditions. Such characteristics make it easier to penetrate into controlled areas, negotiation zones, and the like in order to violate the information security of workplaces. For example, a board with a wireless controller connected to an external power source is capable of intercepting network traffic, and a single-board computer with interfaces for connecting external devices, disguised as some other household item, is capable of taking photos and videos. One of the key methods of combating these violations is understanding the principles of operation and use of single-board computers by intruders in illegal actions, the purpose of which is to violate information security." @default.
- W4320506536 created "2023-02-14" @default.
- W4320506536 creator A5005301412 @default.
- W4320506536 creator A5072968183 @default.
- W4320506536 date "2022-11-15" @default.
- W4320506536 modified "2023-09-27" @default.
- W4320506536 title "POTENTIAL SECURITY ATTACKS VIA THE ILLEGAL DISTRIBUTION OF SINGLE BOARD COMPUTERS" @default.
- W4320506536 doi "https://doi.org/10.5593/sgem2022/2.1/s07.011" @default.
- W4320506536 hasPublicationYear "2022" @default.
- W4320506536 type Work @default.
- W4320506536 citedByCount "0" @default.
- W4320506536 crossrefType "proceedings-article" @default.
- W4320506536 hasAuthorship W4320506536A5005301412 @default.
- W4320506536 hasAuthorship W4320506536A5072968183 @default.
- W4320506536 hasConcept C111919701 @default.
- W4320506536 hasConcept C26517878 @default.
- W4320506536 hasConcept C2776576444 @default.
- W4320506536 hasConcept C2777904410 @default.
- W4320506536 hasConcept C38652104 @default.
- W4320506536 hasConcept C41008148 @default.
- W4320506536 hasConceptScore W4320506536C111919701 @default.
- W4320506536 hasConceptScore W4320506536C26517878 @default.
- W4320506536 hasConceptScore W4320506536C2776576444 @default.
- W4320506536 hasConceptScore W4320506536C2777904410 @default.
- W4320506536 hasConceptScore W4320506536C38652104 @default.
- W4320506536 hasConceptScore W4320506536C41008148 @default.
- W4320506536 hasLocation W43205065361 @default.
- W4320506536 hasOpenAccess W4320506536 @default.
- W4320506536 hasPrimaryLocation W43205065361 @default.
- W4320506536 hasRelatedWork W1794016765 @default.
- W4320506536 hasRelatedWork W2329452785 @default.
- W4320506536 hasRelatedWork W2356380379 @default.
- W4320506536 hasRelatedWork W2363925233 @default.
- W4320506536 hasRelatedWork W2364808845 @default.
- W4320506536 hasRelatedWork W2366284060 @default.
- W4320506536 hasRelatedWork W2391464953 @default.
- W4320506536 hasRelatedWork W2408371061 @default.
- W4320506536 hasRelatedWork W3027915305 @default.
- W4320506536 hasRelatedWork W4206710999 @default.
- W4320506536 isParatext "false" @default.
- W4320506536 isRetracted "false" @default.
- W4320506536 workType "article" @default.