A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2022; you can also visit the original URL.
The file type is
INTERNET OF THINGS SECURITY FRAMEWORK
STRATEGIES XXI - Security and Defense Faculty
It was unimaginable for a non-professional user that access data to personal e-mail, bank or identity accounts could be stolen via a mobile phone interface or connection, no more than twenty years ago. Nowadays, people with bad intentions – hacker – can use smart devices, such as: webcams, microwaves, refrigerators, door controllers, and others, generically we named it IoT, to access accounts like the ones mentioned above, without much effort. The Internet of Things is the place wheredoi:10.53477/2668-2001-21-36 fatcat:tvnos456xbhofejijjk3wqqavy