From the course: Ethical Hacking: Hacking IoT Devices

Unlock the full course today

Join today to access over 24,900 courses taught by industry experts.

Countering IoT attacks

Countering IoT attacks

- [Narrator] IoT devices have multiple attack surfaces that can make them a vulnerable target. In this segment, we'll outline the top IoT vulnerabilities as identified by OWASP and discuss corresponding mitigation strategies to prevent an attack today. There are many areas in the rapidly growing IoT that can have one or more vulnerabilities, which can lead to an attack on the infrastructure or supply chain. First, let's talk about the multiple attack surfaces that we might encounter when dealing with the IoT. An attack surface represents all the entry points that could be exploited by malicious actors to compromise the integrity of a system. IoT devices can include everything from health devices and home automation to sprinkler systems and doorbells. Most have external connectivity to the outside world along with many more things in between. For example, in this graphic we see the following elements that could potentially be compromised. There's the IoT devices such as automobiles…

Contents