In order to launch an attack on some IoT devices, no malware is needed. This is because of gaping vulnerabilities, including default usernames and passwords, outdated firmware, and the ability to reach the device using Telnet and SSH.
- [Instructor] In order to launch an attack…on some IoT devices, a hacker doesn't even need…to use malware because of gaping flaws…including default username and passwords…and the ability to access the device over the Internet…using telnet and SSH.…Recent testing indicated that 25 percent of devices tested…had weaknesses and for each device,…there were approximately 750 exploitable flaws.…
These are not limited to a single vendor or device.…The sheer number is of great concern…when one in four devices are exposed.…Although there are many,…main areas of concern include:…outdated firmware, default username and password,…outward-facing and exposure to the Internet…with no firewall protection.…Each device represents a doorway into your home…and/or organization.…
When selecting an appropriate IoT device,…the consumer should require that the vendors…have defended the device against common attacks…listed in the OWASP's top 10 list.…Let's take a look.…I'm at the OWASP Top Ten Project…and here we can see, this is a project…
In this course, join Lisa Bock as she explores the relationship between security, privacy, and the IoT. Lisa discusses how the vulnerabilities in IoT devices have the potential to compromise user privacy and make them more susceptible to attacks and glitches. In addition, she discusses IoT privacy concerns; existing standards, regulations, and guidelines, such as HIPAA and Sarbanes-Oxley; and proposed standards and legislation that are currently in the works to ensure the privacy of the data collected on the IoT.
- Security, privacy, and the IoT
- Attacks and glitches
- Denial-of-sleep attacks
- Voice and sound attacks
- IoT vulnerabilities
- Glitches and compatibility issues
- Privacy concerns
- Existing standards and regulations
- Proposed standards and legislation
- Firewalls and IDS
Skill Level Intermediate
Raspberry Pi: Home Monitoring and Controlwith David Ross1h 29m Intermediate
Ethical Hacking: Mobile Devices and Platformswith Malcolm Shore1h 47m Intermediate
2. Potential Attacks and Glitches
5. Existing Standards and Regulations
6. Proposed Standards and Legislation
7. Securing IoT Devices
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.Cancel
Take notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.