From the course: Threat Modeling: Denial of Service and Elevation of Privilege

Unlock the full course today

Join today to access over 22,400 courses taught by industry experts or purchase this course individually.

Mobile and IoT denial of service

Mobile and IoT denial of service

From the course: Threat Modeling: Denial of Service and Elevation of Privilege

Start my 1-month free trial

Mobile and IoT denial of service

- [Instructor] Anyone who's lost cell service unexpectedly in a denser urban building, in the mountains or anywhere in between will be very aware of the possibilities for accidental denial of service against cell networks. These problems crop up during disasters when everyone's trying to use the phone, hint, send text messages, also during massive conferences, celebrations like your team winning the pennant or St. Patty's day in Chicago. From the server's perspective, this can look like a denial of service attack against the end point. And from the end point, it can look like a denial of service attack against the infrastructure or server. Denial of service against phone networks can be incited by falsely claiming they cause the plague or by jamming systems. Of course, mobile devices have batteries and physical cases and we know that both fail. In that they're like IOT devices, all are vulnerable to the dreaded cup of…

Contents