From the course: Ethical Hacking: Denial of Service

Unlock the full course today

Join today to access over 22,500 courses taught by industry experts or purchase this course individually.

Considering IoT denial

Considering IoT denial

From the course: Ethical Hacking: Denial of Service

Start my 1-month free trial

Considering IoT denial

- [Instructor] There are many different things that come under the umbrella of Internet of Things. These range from sub-dollar low-power sensors to cars and drones. Each type has its own characteristics which make security difficult, including its level of vulnerability to denial of service. IoT environments have a broad spectrum of vulnerabilities. They use a wide range of communications protocols and often operate with mobility, making a common protective mechanism problematic. They may be configured with shared or default passwords and may be physically unprotected. IoT devices often lack reliable authentication schemes and allow network access through insecure services such as Telnet and unencrypted HTTP. These all encourage malware infection. They may not be designed to support firmware updates to correct security bugs. These characteristics mean that IoT devices are not only vulnerable to denial of service, but are…

Contents