Explore the relationship between security, privacy, and the IoT. Learn about IoT vulnerabilities, privacy concerns, attacks and glitches, and more.
Overview
Syllabus
Introduction
- Securing the IoT
- What you should know
- Security, privacy, and IoT
- Internet of Things
- Security
- Privacy
- Massive adoption
- Attacks and glitches
- DDoS
- Denial-of-sleep attacks
- IoT worms
- Voice and sound attacks
- IoT vulnerabilities
- No malware needed
- Vendor backdoors
- Glitches and compatibility issues
- Army of Things
- Privacy concerns
- Spying
- Data collection
- Independent devices
- Government
- Challenge: Understanding IoT vulnerabilities
- Solution: Understanding IoT vulnerabilities
- Standards, regulations, and guidelines
- PCI DSS
- HIPAA
- COBIT
- Sarbanes-Oxley
- Need for standards
- Security legislation
- Discovering the IoT security foundation
- Using resources on NIST and OWASP
- IoT protocols
- Common IoT language
- Firewalls and IDS
- Defending against IoT malware
- Blockchains and Physical Unclonable Functions (PUF)
- Education and awareness
- Next steps
Taught by
Lisa Bock