Time
1 hour 44 minutes
Difficulty
Beginner
CEU/CPE
2

Video Transcription

00:01
hi and welcome to lessen for that to off the end user cyber fundamentals course.
00:08
This lesson will be focused on the risks of I. O T devices.
00:15
In this lesson, you will learn about the risks of I O T devices and how they can affect you.
00:25
So what are the risks of I o T devices?
00:30
Patching and update difficulties and vulnerabilities?
00:34
Most I O T devices have little or no built in security
00:39
that makes them vulnerable to hackers and malware.
00:43
Security usually is not top of mind for most i ot device manufacturers.
00:50
Very few even consider the inherent security issues associated with data, access and management,
00:58
or even with the ill T devices themselves.
01:02
Most I ot devices have no system hardening.
01:06
They have default or hard coded passwords
01:10
and even know way to update the device to address vulnerabilities.
01:15
Most of them do not get enough updates
01:18
or even any at all.
01:19
If the device was considered secure when you bought it
01:23
and it does not receive updates and patches,
01:26
then it will eventually become insecure
01:30
and in danger of getting hacked.
01:34
Ah, bad actor can hack into your I O T devices and then use it to gain access to your network.
01:42
We will talk more about this later.
01:46
Physical security Since I O. T devices run with little or no human intervention,
01:53
these devices tend to be for gotten.
01:55
Some are installed in a remote or hard to reach places such as cameras, which means they may be exposed to tampering.
02:04
IOC devices are always on, which also makes them on ideal target.
02:09
Ah, bad actor can install malware and steal sensitive information.
02:15
The malware can also affect the reliability of the device.
02:23
Botnets and lack of monitoring
02:25
vomits are thousands or millions of devices infected with malware
02:30
that allows a bad actor to control or use your device for malicious activity without your knowledge.
02:38
I o. T devices are particularly vulnerable as they generally do not receive regular updates and are not very secure.
02:47
I'll T powered botnets cannot only bring down leading websites but also jeopardize infrastructure such as electricity grids, transportation systems, water treatment facilities and manufacturing plants.
03:05
Since I O. T devices are rarely monitored and poorly maintained, hackers can easily shut down or take over a large number of I O T devices,
03:15
including yours.
03:20
Lack of user awareness and knowledge
03:23
to make it even easier for bad actors. The average user lacks the knowledge and awareness to monitor or secure their network,
03:32
making it easier for the bad actor to gain access to their I OT devices and potentially their network.
03:45
So why should you be concerned?
03:49
Take into consideration the consumer I O T devices in your home
03:54
baby monitors, smart thermostats, alarm systems, smart home assistance, wireless cameras, even your fitness trackers.
04:04
If any of thes devices gets hacked, not only can the bad actor gain access to your network and then compromise your computers or other devices,
04:15
they had potentially controlled your heats or air conditioning
04:19
and demand you pay ransom.
04:23
They can determine your schedule
04:26
when you are home and when you go out every day and then invade your home
04:30
or hack your inside cameras and threatened to stream them on the Internet unless you pay them, I can go on. But this is not to scare you. Although these are very real scenarios, it is to educate you.
04:44
We will talk about precautions you can take to security devices in order to protect yourself.
04:53
What if my i o. T. device gets hacked.
04:56
Can the hacker get access to my computer?
05:00
Yes, they can. If you are like most users and have all your I O. T devices on the same home wireless network as your computers,
05:11
tablets, smartphones and other devices than the hacker can potentially gain access to any device on the same network as the compromise I ot device.
05:26
In this lesson, we discussed various risks of I O T devices,
05:32
how they can affect you
05:34
and why you should be concerned.
05:40
Here are my references and I will see you in the next lesson.

Up Next

End User Cyber Fundamentals

This End User Cyber Fundamentals course covers Internet risks such as typosquatting, website spoofing, drive-by downloads, Malvertising, and how to protect yourself using security best practices.

Instructed By

Instructor Profile Image
Lisa Martino
Director, Information Security Governance, Risk & Compliance
Instructor