Informe Tecnico Seguridad Informatica
Informe Tecnico Seguridad Informatica
IoT deployment in healthcare improves patient care by enabling real-time, non-invasive monitoring, which enhances responsiveness and treatment accuracy. However, it introduces vulnerabilities as medical devices are connected to networks, making them susceptible to cyber attacks that can affect patient safety and data privacy .
The Internet of Things enhances industrial infrastructure by connecting machinery, assembly robots, temperature sensors, and production control systems, improving efficiency and centralizing control. In urban infrastructure, IoT helps monitor and manage traffic lights, trains, cameras, and adapt the system for event responses. However, these connections increase the risk of cyber attacks, as they make critical infrastructure more vulnerable to unauthorized access and control .
The 'everything is connected' concept in IoT increases security risks by exposing devices and systems to potential cyber attacks due to their network connectivity. Critical infrastructures, being part of this network, become more vulnerable. Mitigation measures include enhancing device authentication, encryption, network segmentation, and continuous monitoring to detect and respond to threats promptly .
Malware is designed to cause harm to systems, steal information, or disrupt operations by exploiting software vulnerabilities. Spam, however, primarily serves to distribute unsolicited information, often for commercial or advertising purposes, without necessarily causing system damage. The impact of malware is often technical and harmful, whereas spam mainly overburdens communication channels .
Major human-related threats include social engineering, where attackers manipulate users for confidential information, and unauthorized individuals such as internal, external personnel, or social engineers exploiting user errors. These threats compromise data integrity by unauthorized access to the system, leading to data leaks, corruption, or theft .
Software security involves ensuring that a product continues functioning correctly despite malicious attacks, while hardware security protects physical objects against intrusion. Together, they contribute to the overall protection of information systems by reducing vulnerabilities and restricting unauthorized access, which is essential to prevent cyber threats such as malware, spyware, and trojans .
Ransomware attacks block access to a user's system until a ransom is paid, which can lead to financial loss and operational disruption. Prevention is preferred over paying because payment doesn't guarantee data recovery and can incentivize attackers to continue extorting victims. Implementing preventive measures such as regular backups, employee training, and security protocols can mitigate risks and reduce the impact of potential attacks .
Hackers, crackers, and pheakers impact cyber threats differently. Hackers may have ethical motives, using their skills to improve security but can also participate in illicit activities. Crackers are primarily focused on breaking into systems with malicious intent. Pheakers manipulate telecommunications systems, often for fraud or data theft. Their influence varies based on motives and methods, affecting network and data integrity in diverse ways .
Social engineering poses a significant threat because it exploits human psychology rather than technical vulnerabilities, making it harder to safeguard against. Attackers manipulate users into divulging confidential information, which can lead to unauthorized system access and data breaches. This approach doesn't require complex hacking skills but relies on deception, often making it more effective and challenging to detect .
The main security measures against common information system threats include using legally acquired software, implementing antivirus suites with properly defined rules, employing firewalls to block unauthorized access, using complex passwords consisting of special characters, numbers, and letters, and leveraging cryptography such as encryption to safeguard sensitive information. Additionally, it is important to be cautious of social engineering attacks through social networks .