0% found this document useful (0 votes)
121 views

1126 Lab Learning The Details of Attacks

The document discusses researching vulnerabilities in Internet of Things (IoT) applications. It provides background on the growth of IoT devices and their vulnerability to security threats due to a lack of consideration for security in design. It instructs the reader to search for examples of IoT vulnerabilities in different sectors, and to analyze who could exploit each vulnerability, what caused it, and how it could be limited. The reader is asked to choose a vulnerability to research in more depth and answer questions about it.

Uploaded by

setyabudhi
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
121 views

1126 Lab Learning The Details of Attacks

The document discusses researching vulnerabilities in Internet of Things (IoT) applications. It provides background on the growth of IoT devices and their vulnerability to security threats due to a lack of consideration for security in design. It instructs the reader to search for examples of IoT vulnerabilities in different sectors, and to analyze who could exploit each vulnerability, what caused it, and how it could be limited. The reader is asked to choose a vulnerability to research in more depth and answer questions about it.

Uploaded by

setyabudhi
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

1.1.2.

6 Lab – Learning the Details of Attacks


itexamanswers.net/1-1-2-6-lab-learning-the-details-of-attacks.html

Rate this post

Objectives
Research and analyze IoT application vulnerabilities

Background / Scenario
The Internet of Things (IoT) consists of digitally connected devices that are connecting
every aspect of our lives, including our homes, offices, cars, and even our bodies to the
Internet. With the accelerating adoption of IPv6 and the near universal deployment of
Wi-Fi networks, the IoT is growing at an exponential pace. Industry experts estimate that
by 2020, the number of active IoT devices will approach 50 billion. IoT devices are
particularly vulnerable to security threats because security has not always been
considered in IoT product design. Also, IoT devices are often sold with old and unpatched
embedded operating systems and software.

Required Resources
PC or mobile device with Internet access

Conduct a Search of IoT Application Vulnerabilities


Using your favorite search engine, conduct a search for Internet of Things (IoT)
vulnerabilities. During your search, find an example of an IoT vulnerability for each of the
IoT verticals: industry, energy systems, healthcare, and government. Be prepared to

1/2
discuss who might exploit the vulnerability and why, what caused the vulnerability, and
what could be done to limit the vulnerability? Some suggested resources to get started
on your search are listed below:

Cisco IoT Resources


IoT Security Foundation
Business Insider IoT security threats

Note: You can use the web browser in the virtual machine installed in a previous lab to
research security issues. By using the virtual machine, you may prevent malware from
being installed on your computer.

From your research, choose an IoT vulnerability and answer the following questions:

a. What is the vulnerability?


_________________________________________________________________

b. Who might exploit it? Explain.


__________________________________________________________________

c. Why does the vulnerability exist?


__________________________________________________________________

d. What could be done to limit the vulnerability?


___________________________________________________________________

2/2

You might also like