1126 Lab Learning The Details of Attacks
1126 Lab Learning The Details of Attacks
Objectives
Research and analyze IoT application vulnerabilities
Background / Scenario
The Internet of Things (IoT) consists of digitally connected devices that are connecting
every aspect of our lives, including our homes, offices, cars, and even our bodies to the
Internet. With the accelerating adoption of IPv6 and the near universal deployment of
Wi-Fi networks, the IoT is growing at an exponential pace. Industry experts estimate that
by 2020, the number of active IoT devices will approach 50 billion. IoT devices are
particularly vulnerable to security threats because security has not always been
considered in IoT product design. Also, IoT devices are often sold with old and unpatched
embedded operating systems and software.
Required Resources
PC or mobile device with Internet access
1/2
discuss who might exploit the vulnerability and why, what caused the vulnerability, and
what could be done to limit the vulnerability? Some suggested resources to get started
on your search are listed below:
Note: You can use the web browser in the virtual machine installed in a previous lab to
research security issues. By using the virtual machine, you may prevent malware from
being installed on your computer.
From your research, choose an IoT vulnerability and answer the following questions:
2/2