Читать книгу Industrial Internet of Things (IIoT). Intelligent Analytics for Predictive Maintenance онлайн
96 страница из 122
This section compacts how data are stored and well-ordered remotely in IoT infrastructures. There is a probability to exploit servers when the cloud servers are improperly connected as well as end-point devices.
i. SQL injection: It occurs if the web application does not approve any contribution of the client appropriately. However, without approval, the user response is given to the server program and it might execute whatever the response given the outbreak on SQL server. Consequently, data required is gathered by attacker. This situation leads to huge loss for that particular company who has this issue [41].
ii. DDoS: It renders the service unreachable by the client by engulfing the system with heavier traffic. This incapacitates system assets and devices execution. This attack takes place by negotiating massive equipment available across modeling bots [42].
iii. Weak authentication: Due to weak verification system, the system can be signed in using brute force technique and via default passwords. Huge mainstream of the devices are weak authentically in the absence user and designer [43].