IoT systems come with a great number of security risks. Because of the huge amounts of vulnerabilities in IoT, anti-malware companies are researching ways to defend against the next attack.
- [Voiceover] Hackers are counting on several factors…as they design malware.…Vendors rarely if ever patch IoT devices.…Many are off the shelf and have no vendor support.…IoT devices are easy to install and tether to the internet.…Unsuspecting consumers may feel it's easy and practical…to purchase and install a security camera…to monitor the warehouse,…but it may be the optimal opening…for malware creators to get into the device.…
Devices have a long shelf life.…Once vulnerable, they will most likely…remain an easy target.…Hackers that periodically run a scan…to locate the devices will most likely…be successful.…The source code for many IoT devices…is freely available so that hackers…can study the code and make modifications…to launch a successful attack.…Most IoT devices don't have a feature…called secure boot,…where the boot manager checks to see…if any instructions that it's given…is from a valid source.…
Because most IoT devices don't use secure boot,…a hacker can modify the code…and inject it into the device…and change the nature of a device.…
In this course, join Lisa Bock as she explores the relationship between security, privacy, and the IoT. Lisa discusses how the vulnerabilities in IoT devices have the potential to compromise user privacy and make them more susceptible to attacks and glitches. In addition, she discusses IoT privacy concerns; existing standards, regulations, and guidelines, such as HIPAA and Sarbanes-Oxley; and proposed standards and legislation that are currently in the works to ensure the privacy of the data collected on the IoT.
- Security, privacy, and the IoT
- Attacks and glitches
- Denial-of-sleep attacks
- Voice and sound attacks
- IoT vulnerabilities
- Glitches and compatibility issues
- Privacy concerns
- Existing standards and regulations
- Proposed standards and legislation
- Firewalls and IDS
Skill Level Intermediate
Raspberry Pi: Home Monitoring and Controlwith David Ross1h 29m Intermediate
Ethical Hacking: Mobile Devices and Platformswith Malcolm Shore1h 47m Intermediate
2. Potential Attacks and Glitches
5. Existing Standards and Regulations
6. Proposed Standards and Legislation
7. Securing IoT Devices
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.Cancel
Take notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.