The following is an overview of the frequent attacks known today.
IoT Network Vulnerability
There are several vulnerable areas in IoT systems. IoT systems are based on digital processors, implemented in a combination of hardware associated with software and may have weaknesses in hardware and/or software; and in usage policies and procedures.
A threat is an action that takes advantage of security weaknesses in a system and negatively impact its operation. Threats can originate from two sources: human threats and natural threats.
Attacks are actions performed with the specific intention of damaging or interrupting the normal operation of a system, exploiting vulnerabilities through techniques and tools created for this purpose. The diagram on the side classifies the attacks considering the different layers of the IoT network. To be a reference in providing solutions and tools for embedded systems through the development and sale of innovative products based on high technology, contributing to society and the environment.