In some cases, IoT devices come shipped with vendor-hidden backdoors, installed so that someone can take over the device and have root-access privilege. This allows them to get into the system without using a password.
- [Instructor] IoT devices range from…consumer off the shelf products used in home for tasks…such as opening the garage door…to enterprise versions for large companies.…Many are not secure and there are several reasons.…Manufacturers have a sense of urgency in releasing…new smart devices without proper testing.…As a result, many have critical flaws.…
Vendors are determined to market devices…and get them in the consumers' hands as soon as possible,…mainly because of profit.…Consumers are anxious to install and use the device…without much consideration for the security.…And many cases, they don't even change the default password.…Researchers are finding it's not just about the shear amount…of flaws on IoT devices, but also vendor backdoors.…
An owner can adjust and control an IoT device.…However, if there's a built in backdoor on the device,…that single device at the homeowner's garage,…along with hundreds and thousands of devices…across the world, can be controlled remotely…and autonomously.…A number of recent reports have disclosed hidden backdoors…
In this course, join Lisa Bock as she explores the relationship between security, privacy, and the IoT. Lisa discusses how the vulnerabilities in IoT devices have the potential to compromise user privacy and make them more susceptible to attacks and glitches. In addition, she discusses IoT privacy concerns; existing standards, regulations, and guidelines, such as HIPAA and Sarbanes-Oxley; and proposed standards and legislation that are currently in the works to ensure the privacy of the data collected on the IoT.
- Security, privacy, and the IoT
- Attacks and glitches
- Denial-of-sleep attacks
- Voice and sound attacks
- IoT vulnerabilities
- Glitches and compatibility issues
- Privacy concerns
- Existing standards and regulations
- Proposed standards and legislation
- Firewalls and IDS
Skill Level Intermediate
Raspberry Pi: Home Monitoring and Controlwith David Ross1h 29m Intermediate
Ethical Hacking: Mobile Devices and Platformswith Malcolm Shore1h 52m Intermediate
2. Potential Attacks and Glitches
5. Existing Standards and Regulations
6. Proposed Standards and Legislation
7. Securing IoT Devices
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.Cancel
Take notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.