IoT devices lack basic security defenses, such as the way the device handles authentication and can fall victim to malware. IoT devices can become part of a bot that can cause a global Internet outage, or become part of a massive bitcoin operation.
- [Voiceover] IoT devices lack basic security defenses…such as the way the device handles authentication…and can fall victim to malware.…Some devices have a built-in backdoor…so the manufacturer can access the device remotely…over the internet using default credentials.…Although not a malicious backdoor,…this could give others access to the device.…Some of the very tools that are available…to make IoT devices easy to access…have come under attack.…
In the fall of 2016, the Marai bot attacked DNS…and caused major outages throughout the country.…Let's step through how this works.…Domain name system is an application layer protocol…and is essential to any network.…DNS converts host names to IP addresses.…DNS failures will prevent hosts from communicating…or even locating each other.…
Now, there's two types, static and dynamic IP addresses.…A business will register their domain name…and obtain a permanent or static IP address.…For example, Google.com will have an IP address…of 188.8.131.52.…An average consumer won't have a static IP address…
In this course, join Lisa Bock as she explores the relationship between security, privacy, and the IoT. Lisa discusses how the vulnerabilities in IoT devices have the potential to compromise user privacy and make them more susceptible to attacks and glitches. In addition, she discusses IoT privacy concerns; existing standards, regulations, and guidelines, such as HIPAA and Sarbanes-Oxley; and proposed standards and legislation that are currently in the works to ensure the privacy of the data collected on the IoT.
- Security, privacy, and the IoT
- Attacks and glitches
- Denial-of-sleep attacks
- Voice and sound attacks
- IoT vulnerabilities
- Glitches and compatibility issues
- Privacy concerns
- Existing standards and regulations
- Proposed standards and legislation
- Firewalls and IDS
Skill Level Intermediate
Raspberry Pi: Home Monitoring and Controlwith David Ross1h 29m Intermediate
Ethical Hacking: Mobile Devices and Platformswith Malcolm Shore1h 47m Intermediate
2. Potential Attacks and Glitches
5. Existing Standards and Regulations
6. Proposed Standards and Legislation
7. Securing IoT Devices
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.Cancel
Take notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.