Skip to main content

IoT Upcoming Trend or Threat!

IoT - Trend or Threat

IoT (Internet of Things) is a group of interconnected devices which perform some action.

IoT may be a group of CCTVs, Home Sensors, Security Gate sensors, Temperature and humidity sensors,  etc. interconnected to a server which can generate reports for events and alert the owner or perform some action based on some threshold value.

Ex. Stop cooling once temperature reaches 22 Degree Celsius. Or Open the main entrance gate once the owner's vehicle reaches home, etc.

The Internet of Things bring a great help when they perform these actions, however, as easy the technology becomes, so difficult is to protect it from prying eyes.

Good Part:
Inter connected devices performs tasks in a much better and controlled way
Provides information from remote areas
Gives better control of what is happening at a Smart Home, Smart City, etc

Bad part:
Many vendors manufacture devices with little or no security.
They develop these things for functionality and sell cheap. So they don't concentrate on securing the devices.
Many hardware are prone to attacks.
Passwords are set to default or encryption standards are not upto the mark.
Since interconnected, if one devices is compromised, it may lead to series of compromised devices.

I will update the page with more information.

If you use a IoT device, please ensure to keep it secure.

Have a wonderful day!

Want to learn more about IoT - Free courses at https://iotroots.com

Comments

Popular posts from this blog

CEH-V10 Released - Its going to be tougher with practicals

Certified Ethical Hacker V 10 Released As per sources, it is said to be tougher than CEH V9. Mostly because it  involves a 4 hour multiple choice exam as well as a 6 hour practical exam So CEHians be prepared for CEH V10. If you want to write older CEH V9, you still can write it upto 10th April 2018. Afterwards, only CEH V10 will be available. It is also good to know that CEH V10 will contain modules on IOT and Mobile Hacking. official site Be prepared! Details: What is New in CEH Version 10 Course Module 01: Introduction to Ethical Hacking Module 02: Footprinting and Reconnaissance Module 03: Scanning Networks Module 04: Enumeration Module 05: Vulnerability Analysis Module 06: System Hacking Module 07: Malware Threats Module 08: Sniffing Module 09: Social Engineering Module 10: Denial-of-Service Module 11: Session Hijackingofficial site Module 12: Evading IDS, Firewalls, and Honeypots Module 13: Hacking Web Servers Module 14: Hacking Web A...

Nmap - Network Mapper Free Security Scanner

Nmap - Network Mapper Nmap is a very important tool in network discovery. It is the de-facto tool for footprinting networks. It is capable of finding alive hosts, access points, finger-printing operating systems, and verifying running or available services. It also has important IDS evasion capabilities. Seven generic scan types for port scanning:     TCP Connect Runs through a full connection (three-way handshake) on all ports. Easiest to detect, but possibly the most reliable. Open ports will respond with a SYN/ACK, closed ports with a RST/ACK.     SYN Known as a “half-open scan.” Only SYN packets are sent to ports (no completion of the three-way handshake ever takes place). Open ports will respond with a SYN/ACK, closed ports with a RST/ACK.     FIN scans run the communications setup in reverse, sending a packet with the FIN flag set. Closed ports will respond with RST, whereas open ports won’t respond at all.   ...

Certified Ethical Hacker - CEH

CEH Course Outline: Introduction to Ethical Hacking Footprinting and reconnaissance Scanning Networks Enumeration System Networks Malware Threats Sniffing Social Engineering Denial-of-Service Session Hacking Hacking Webservers Hacking Web Applications SQL Injection Hacking Wireless Networks Hacking Mobile Platforms Evading IDS, Firewalls, and Honeypots Cloud Computing Cryptography