IoT Introduction

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or

Already have an account? Sign In »

Time
7 hours 50 minutes
Difficulty
Beginner
CEU/CPE
8
Video Transcription
00:00
>> Another topic bursting onto the scenes today is IoT,
00:00
the Internet of Things.
00:00
With the Internet of Things,
00:00
the idea is everything is
00:00
network ready and network capable.
00:00
That gives us so much ease to
00:00
use with these personal assistants,
00:00
games that are accessible,
00:00
and being able to be configured through Wi-Fi connection,
00:00
but will also give us all of these issues.
00:00
There's always going to be security considerations.
00:00
Often we have cool technology that comes
00:00
out and then all of a sudden we say,
00:00
it's insecure, is it?
00:00
You can see that just from a handful of
00:00
these being hacked through its Bluetooth system,
00:00
ring doorbells and ring doorbells get rid of them.
00:00
They really are a security concern
00:00
as far as privacy goes.
00:00
Then again, anything you put on
00:00
the network can be accessed through your network.
00:00
If we don't have firewalls,
00:00
if we don't have protection,
00:00
if we don't have strong authentication,
00:00
then we just have this wealth of services
00:00
we need to be compromised.
00:00
The Internet of Things is much more than
00:00
having Alexa to track your grocery list.
00:00
We're again seeing every environment
00:00
really taking advantage of this.
00:00
We have smart cities now where I can pull up to
00:00
a parking meter based on a tag of my car,
00:00
I can automatically be debited for parking.
00:00
I've got general use for controlling lighting systems,
00:00
large computer-based systems, inventory control,
00:00
just on and on and on.
00:00
Even the deployments in healthcare monitoring
00:00
with Internet of Things.
00:00
Again, these personal systems and
00:00
home monitoring tools are everywhere.
00:00
What we have to consider is as handy as some of this is,
00:00
surely there aren't any security considerations.
00:00
Of course, we built these to
00:00
be secure from the ground up.
00:00
But we know that's not true.
00:00
When we look to understand what
00:00
vulnerabilities are out there,
00:00
it's always good to know where to go.
00:00
It's always good to have a trusted, reliable source.
00:00
OWASP is one of those.
00:00
OWASP stands for
00:00
the Open Web Application Security Project.
00:00
They present a top 10 list for
00:00
a lot of different types of technology.
00:00
They primarily focus on web applications.
00:00
Every few years, they update their top 10.
00:00
Here are the most common vulnerabilities with web apps.
00:00
They also talk about other application security.
00:00
Then in 2018,
00:00
they published the top 10 issues
00:00
for the Internet of Things.
00:00
This is not testable.
00:00
For instance, you're not going to get a test question.
00:00
What's the seven most common issue
00:00
with the Internet of Things?
00:00
However, I do want to go through these.
00:00
I'm not going to spend a lot of
00:00
time on them but I do want to
00:00
communicate some of the vulnerabilities that do exist.
Up Next