From the course: Ethical Hacking: Denial of Service
Unlock the full course today
Join today to access over 22,500 courses taught by industry experts or purchase this course individually.
Considering IoT denial
From the course: Ethical Hacking: Denial of Service
Considering IoT denial
- [Instructor] There are many different things that come under the umbrella of Internet of Things. These range from sub-dollar low-power sensors to cars and drones. Each type has its own characteristics which make security difficult, including its level of vulnerability to denial of service. IoT environments have a broad spectrum of vulnerabilities. They use a wide range of communications protocols and often operate with mobility, making a common protective mechanism problematic. They may be configured with shared or default passwords and may be physically unprotected. IoT devices often lack reliable authentication schemes and allow network access through insecure services such as Telnet and unencrypted HTTP. These all encourage malware infection. They may not be designed to support firmware updates to correct security bugs. These characteristics mean that IoT devices are not only vulnerable to denial of service, but are…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.