hi and welcome to lessen for that to off the end user cyber fundamentals course.
This lesson will be focused on the risks of I. O T devices.
In this lesson, you will learn about the risks of I O T devices and how they can affect you.
So what are the risks of I o T devices?
Patching and update difficulties and vulnerabilities?
Most I O T devices have little or no built in security
that makes them vulnerable to hackers and malware.
Security usually is not top of mind for most i ot device manufacturers.
Very few even consider the inherent security issues associated with data, access and management,
or even with the ill T devices themselves.
Most I ot devices have no system hardening.
They have default or hard coded passwords
and even know way to update the device to address vulnerabilities.
Most of them do not get enough updates
or even any at all.
If the device was considered secure when you bought it
and it does not receive updates and patches,
then it will eventually become insecure
and in danger of getting hacked.
Ah, bad actor can hack into your I O T devices and then use it to gain access to your network.
We will talk more about this later.
Physical security Since I O. T devices run with little or no human intervention,
these devices tend to be for gotten.
Some are installed in a remote or hard to reach places such as cameras, which means they may be exposed to tampering.
IOC devices are always on, which also makes them on ideal target.
Ah, bad actor can install malware and steal sensitive information.
The malware can also affect the reliability of the device.
Botnets and lack of monitoring
vomits are thousands or millions of devices infected with malware
that allows a bad actor to control or use your device for malicious activity without your knowledge.
I o. T devices are particularly vulnerable as they generally do not receive regular updates and are not very secure.
I'll T powered botnets cannot only bring down leading websites but also jeopardize infrastructure such as electricity grids, transportation systems, water treatment facilities and manufacturing plants.
Since I O. T devices are rarely monitored and poorly maintained, hackers can easily shut down or take over a large number of I O T devices,
Lack of user awareness and knowledge
to make it even easier for bad actors. The average user lacks the knowledge and awareness to monitor or secure their network,
making it easier for the bad actor to gain access to their I OT devices and potentially their network.
So why should you be concerned?
Take into consideration the consumer I O T devices in your home
baby monitors, smart thermostats, alarm systems, smart home assistance, wireless cameras, even your fitness trackers.
If any of thes devices gets hacked, not only can the bad actor gain access to your network and then compromise your computers or other devices,
they had potentially controlled your heats or air conditioning
and demand you pay ransom.
They can determine your schedule
when you are home and when you go out every day and then invade your home
or hack your inside cameras and threatened to stream them on the Internet unless you pay them, I can go on. But this is not to scare you. Although these are very real scenarios, it is to educate you.
We will talk about precautions you can take to security devices in order to protect yourself.
What if my i o. T. device gets hacked.
Can the hacker get access to my computer?
Yes, they can. If you are like most users and have all your I O. T devices on the same home wireless network as your computers,
tablets, smartphones and other devices than the hacker can potentially gain access to any device on the same network as the compromise I ot device.
In this lesson, we discussed various risks of I O T devices,
how they can affect you
and why you should be concerned.
Here are my references and I will see you in the next lesson.