1.1.2.6 Lab - Learning the Details of Attacks PDF

Title 1.1.2.6 Lab - Learning the Details of Attacks
Course Studio Project 2
Institution Victoria University
Pages 2
File Size 94.3 KB
File Type PDF
Total Downloads 101
Total Views 216

Summary

Lab – Learning the Details of AttacksObjectivesResearch and analyze IoT application vulnerabilitiesBackground / ScenarioThe Internet of Things (IoT) consists of digitally connected devices that are connecting every aspect of our lives, including our homes, offices, cars, and even our bodies to the I...


Description

Lab – Learning the Details of Attacks Objectives Research and analyze IoT application vulnerabilities

Background / Scenario The Internet of Things (IoT) consists of digitally connected devices that are connecting every aspect of our lives, including our homes, offices, cars, and even our bodies to the Internet. With the accelerating adoption of IPv6 and the near universal deployment of Wi-Fi networks, the IoT is growing at an exponential pace. Industry experts estimate that by 2020, the number of active IoT devices will approach 50 billion. IoT devices are particularly vulnerable to security threats because security has not always been considered in IoT product design. Also, IoT devices are often sold with old and unpatched embedded operating systems and software.

Required Resources 

PC or mobile device with Internet access

Conduct a Search of IoT Application Vulnerabilities Using your favorite search engine, conduct a search for Internet of Things (IoT) vulnerabilities. During your search, find an example of an IoT vulnerability for each of the IoT verticals: industry, energy systems, healthcare, and government. Be prepared to discuss who might exploit the vulnerability and why, what caused the vulnerability, and what could be done to limit the vulnerability? Some suggested resources to get started on your search are listed below: Cisco IoT Resources IoT Security Foundation Business Insider IoT security threats Note: You can use the web browser in the virtual machine installed in a previous lab to research security issues. By using the virtual machine, you may prevent malware from being installed on your computer. From your research, choose an IoT vulnerability and answer the following questions: a. What is the vulnerability? Having insecure network services can be a high risk vulnerability. They allow opened doors to be accessed by hackers to steal data and information. ___________________________________________________________________________________ ____________________________________________________________________________________ ____________________________________________________________________________________ ____________________________________________________________________________________ ____________________________________________________________________________________ ____________________________________________________________________________________

 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

Page 1 of 2

www.netacad.com

Lab – Learning the Details of Attacks b. Who might exploit it? Explain. _Internet network services are exploited if any ports are opened on the network for attackers to target. Hackers will write a code to weaken the network, making it vulnerable. An attacker can scan the server for any opened ports and find vulnerable services on the network. If insecure network services are detected, hacker can exploit vulnerabilities in the service like buffer overflows or denial of service. ___________________________________________________________________________________ ____________________________________________________________________________________ ____________________________________________________________________________________ ____________________________________________________________________________________ ____________________________________________________________________________________ ____________________________________________________________________________________ c.

Why does the vulnerability exist? It exist because, users have a lack of security onto their network, leaving them vulnerable for attackers to intervene with the network and steal data. ____________________________________________________________________________________ ____________________________________________________________________________________ ____________________________________________________________________________________ ____________________________________________________________________________________ ____________________________________________________________________________________ ____________________________________________________________________________________

d. What could be done to limit the vulnerability? To prevent further attacks on the network services, identify all services that are required to be open, only ports which are used by these services. All other ports should be closed by setting up a firewall. To block anonymous users entering the network. ___________________________________________________________________________________ ____________________________________________________________________________________ ____________________________________________________________________________________ ____________________________________________________________________________________ ____________________________________________________________________________________ ____________________________________________________________________________________

 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

Page 2 of 2

www.netacad.com...


Similar Free PDFs