SlideShare a Scribd company logo
1
A vulnerability is a flaw or
weakness in an asset’s design,
implementation, or operation
and management that could be
exploited by a threat.
A threat is a potential for
a threat agent to exploit a
vulnerability.
A risk is the potential for
loss when the threat
happens.
Vulnerability x Threat = Risk
2
IoT Architecture
3
Risks of IoT Devices
Cyber criminals an access your
heating and lighting system to
find out if you are away from
home.
Access your password or
even your bank account
through the information you
shared with a digital
assistant like Alexa and
Google Assistant.
Break-in: The hackers can
monitor residents using IP
cameras installed in the
house.
Get into your network through
an IoT device and launch a
ransomware attack making
your IoT smart home
unusable, unless you pay.
Use your devices as BOTs to
deliver computing power for
DDoS attack, click fraud,
password cracking, or send
out spam or mine
cryptocurrency.
Espionage: Hackers can opt
to carry out a campaign
where the end goal is the
prolonged monitoring or
surveillance of a home
4
Risks of IoT Devices
5
Risks of IoT Devices
6
Risks of IoT Devices
7
Amazon explained to ZDNet how it all happened:
"Echo woke up due to a word in background
conversation sounding like 'Alexa,' the company
said in a statement. "Then, the subsequent
conversation was heard as a 'send message'
request. At which point, Alexa said out loud 'To
whom?' At which point, the background
conversation was interpreted as a name in the
customers contact list. Alexa then asked out loud,
'[contact name], right?' Alexa then interpreted
background conversation as 'right'. As unlikely as
this string of events is, we are evaluating options to
make this case even less likely."
Risks of IoT Devices
8
Apply the CIA Triad to Internet of Things Product Design and
Security
9
ELEMENTS OF THE AUGMENTED CIA TRIAD
10
Constant
connectivity
of the
devices
Data sharing
Convenience
Efficiency
Including poor data protection
Poor password protection
Unpatched devices
Poor IoT device management
IoT skill gaps
11
IoT-related cybercrimes
IOT Botnets
and DDoS
Attacks
Data Theft
and Privacy
Breaches
Ransomware
Attacks
Unauthorize
d Access and
Control
Supply Chain
Attacks
Credential
Theft
IoT Device
Manipulatio
n
Surveillance
and
Espionage
Phishing and
Social
Engineering
IoT-Enabled
Vehicle
Hacking
12
IoT Cyber Risks
Weak Authentication
and Authorization:
Many IoT devices have
weak or default
usernames and passwords,
making them vulnerable to
brute force attacks.
Additionally, they may lack
robust authorization
mechanisms, allowing
unauthorized access to
sensitive data or control
over the device.
Lack of Encryption:
IoT devices often
transmit data over
networks without
proper encryption,
leaving data vulnerable
to interception and
tampering. This is
especially concerning
when dealing with
personal or sensitive
information.
Firmware and
Software
Vulnerabilities:
Manufacturers may not
provide regular updates
and patches for IoT
devices, leaving them
exposed to known
vulnerabilities. Hackers
can exploit these
vulnerabilities to gain
access to devices or
compromise their
functionality.
Inadequate Device
Management:
Managing and securing a
large number of IoT
devices can be
challenging.
Organizations may not
have effective processes
in place for monitoring
and updating devices,
leading to security gaps.
Data Privacy
Concerns:
IoT devices collect
vast amounts of data,
often without users'
explicit consent or
knowledge. This data
can be mishandled,
leading to privacy
breaches and
potential misuse.
13
IoT cyber risks
Physical Security:
IoT devices deployed
in physical
environments may
be physically
accessible to
attackers. Tampering
with or stealing
these devices can
compromise
security.
DDoS Attacks:
IoT devices can be
hijacked and used as
part of botnets to
launch Distributed
Denial of Service
(DDoS) attacks on
other systems or
networks.
Interoperability
Issues:
IoT devices from
different
manufacturers may
not always work
seamlessly together,
potentially leading to
security
vulnerabilities when
attempting to
integrate them into a
larger IoT ecosystem.
Supply Chain Risks:
Compromised or
counterfeit IoT
components during
the manufacturing
and distribution
process can
introduce
vulnerabilities into
devices before they
even reach the end
user.
Legacy Devices:
Older IoT devices
may lack modern
security features
and cannot be
easily updated or
replaced, leaving
them susceptible
to attacks.
14
IoT cyber risks Mitigation
Change default
passwords and
usernames on IoT
devices.
Regularly update
device firmware
and software.
Implement strong
encryption and
authentication
mechanisms.
Segment IoT
devices from critical
networks when
possible.
Monitor network
traffic for unusual
activity.
Establish and
enforce IoT
security policies.
Educate users and
employees about
IoT security best
practices.
15
Follow CyberDost
on social media
- Get the latest Cyber Safety Tips
- Learn about various types of Scam Alerts
- Get updates on National and International
Cyber news
- Learn about the achievements in the attempt
to make the nation cyber safe
- Become a Cyber Volunteer and share the
CyberDost content with your community
- Do your bit to stay vigilant and stay cyber safe!
16

More Related Content

Similar to itmsday2.pptx

Addressing security and privacy in io t ecosystem v0.4
Addressing security and privacy in io t ecosystem v0.4Addressing security and privacy in io t ecosystem v0.4
Addressing security and privacy in io t ecosystem v0.4Somasundaram Jambunathan
 
Iot(security)
Iot(security)Iot(security)
Iot(security)
Shreya Pohekar
 
Security in IoT
Security in IoTSecurity in IoT
Security in IoT
SKS
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docx
tjane3
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docx
lmelaine
 
Internet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issuesInternet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issues
Pierluigi Paganini
 
beware of Thing Bot
beware of Thing Botbeware of Thing Bot
beware of Thing Bot
Bellaj Badr
 
Security and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of ThingsSecurity and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of Things
Somasundaram Jambunathan
 
Hacking Internet of Things (IoT)
Hacking Internet of Things (IoT)Hacking Internet of Things (IoT)
Hacking Internet of Things (IoT)
SecPod Technologies
 
Global Technologies and Risks Trends
Global Technologies and Risks TrendsGlobal Technologies and Risks Trends
Global Technologies and Risks Trends
Charles Mok
 
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docxIoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
vrickens
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
AbhishekDas794104
 
Seminar
SeminarSeminar
Cyber Security: A Hands on review
Cyber Security: A Hands on reviewCyber Security: A Hands on review
Cyber Security: A Hands on review
MiltonBiswas8
 
Dissecting internet of things by avinash sinha
Dissecting internet of things by avinash sinhaDissecting internet of things by avinash sinha
Dissecting internet of things by avinash sinha
Avinash Sinha
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docx
voversbyobersby
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
Ramiro Cid
 
Computer security and privacy
Computer security and privacyComputer security and privacy
Computer security and privacy
Haider Ali Malik
 
IoT-Device-Security.pptx
IoT-Device-Security.pptxIoT-Device-Security.pptx
IoT-Device-Security.pptx
ZahidHussainqaisar
 
LIFT OFF 2017: IoT and MSS Deep Dive
LIFT OFF 2017: IoT and MSS Deep DiveLIFT OFF 2017: IoT and MSS Deep Dive
LIFT OFF 2017: IoT and MSS Deep Dive
Robert Herjavec
 

Similar to itmsday2.pptx (20)

Addressing security and privacy in io t ecosystem v0.4
Addressing security and privacy in io t ecosystem v0.4Addressing security and privacy in io t ecosystem v0.4
Addressing security and privacy in io t ecosystem v0.4
 
Iot(security)
Iot(security)Iot(security)
Iot(security)
 
Security in IoT
Security in IoTSecurity in IoT
Security in IoT
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docx
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docx
 
Internet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issuesInternet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issues
 
beware of Thing Bot
beware of Thing Botbeware of Thing Bot
beware of Thing Bot
 
Security and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of ThingsSecurity and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of Things
 
Hacking Internet of Things (IoT)
Hacking Internet of Things (IoT)Hacking Internet of Things (IoT)
Hacking Internet of Things (IoT)
 
Global Technologies and Risks Trends
Global Technologies and Risks TrendsGlobal Technologies and Risks Trends
Global Technologies and Risks Trends
 
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docxIoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Seminar
SeminarSeminar
Seminar
 
Cyber Security: A Hands on review
Cyber Security: A Hands on reviewCyber Security: A Hands on review
Cyber Security: A Hands on review
 
Dissecting internet of things by avinash sinha
Dissecting internet of things by avinash sinhaDissecting internet of things by avinash sinha
Dissecting internet of things by avinash sinha
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docx
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Computer security and privacy
Computer security and privacyComputer security and privacy
Computer security and privacy
 
IoT-Device-Security.pptx
IoT-Device-Security.pptxIoT-Device-Security.pptx
IoT-Device-Security.pptx
 
LIFT OFF 2017: IoT and MSS Deep Dive
LIFT OFF 2017: IoT and MSS Deep DiveLIFT OFF 2017: IoT and MSS Deep Dive
LIFT OFF 2017: IoT and MSS Deep Dive
 

Recently uploaded

The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
Wasim Ak
 
Chapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdfChapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdf
Kartik Tiwari
 
Multithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race conditionMultithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race condition
Mohammed Sikander
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
kimdan468
 

Recently uploaded (20)

The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
 
Chapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdfChapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdf
 
Multithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race conditionMultithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race condition
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
 

itmsday2.pptx

  • 1. 1
  • 2. A vulnerability is a flaw or weakness in an asset’s design, implementation, or operation and management that could be exploited by a threat. A threat is a potential for a threat agent to exploit a vulnerability. A risk is the potential for loss when the threat happens. Vulnerability x Threat = Risk 2
  • 4. Risks of IoT Devices Cyber criminals an access your heating and lighting system to find out if you are away from home. Access your password or even your bank account through the information you shared with a digital assistant like Alexa and Google Assistant. Break-in: The hackers can monitor residents using IP cameras installed in the house. Get into your network through an IoT device and launch a ransomware attack making your IoT smart home unusable, unless you pay. Use your devices as BOTs to deliver computing power for DDoS attack, click fraud, password cracking, or send out spam or mine cryptocurrency. Espionage: Hackers can opt to carry out a campaign where the end goal is the prolonged monitoring or surveillance of a home 4
  • 5. Risks of IoT Devices 5
  • 6. Risks of IoT Devices 6
  • 7. Risks of IoT Devices 7
  • 8. Amazon explained to ZDNet how it all happened: "Echo woke up due to a word in background conversation sounding like 'Alexa,' the company said in a statement. "Then, the subsequent conversation was heard as a 'send message' request. At which point, Alexa said out loud 'To whom?' At which point, the background conversation was interpreted as a name in the customers contact list. Alexa then asked out loud, '[contact name], right?' Alexa then interpreted background conversation as 'right'. As unlikely as this string of events is, we are evaluating options to make this case even less likely." Risks of IoT Devices 8
  • 9. Apply the CIA Triad to Internet of Things Product Design and Security 9
  • 10. ELEMENTS OF THE AUGMENTED CIA TRIAD 10
  • 11. Constant connectivity of the devices Data sharing Convenience Efficiency Including poor data protection Poor password protection Unpatched devices Poor IoT device management IoT skill gaps 11
  • 12. IoT-related cybercrimes IOT Botnets and DDoS Attacks Data Theft and Privacy Breaches Ransomware Attacks Unauthorize d Access and Control Supply Chain Attacks Credential Theft IoT Device Manipulatio n Surveillance and Espionage Phishing and Social Engineering IoT-Enabled Vehicle Hacking 12
  • 13. IoT Cyber Risks Weak Authentication and Authorization: Many IoT devices have weak or default usernames and passwords, making them vulnerable to brute force attacks. Additionally, they may lack robust authorization mechanisms, allowing unauthorized access to sensitive data or control over the device. Lack of Encryption: IoT devices often transmit data over networks without proper encryption, leaving data vulnerable to interception and tampering. This is especially concerning when dealing with personal or sensitive information. Firmware and Software Vulnerabilities: Manufacturers may not provide regular updates and patches for IoT devices, leaving them exposed to known vulnerabilities. Hackers can exploit these vulnerabilities to gain access to devices or compromise their functionality. Inadequate Device Management: Managing and securing a large number of IoT devices can be challenging. Organizations may not have effective processes in place for monitoring and updating devices, leading to security gaps. Data Privacy Concerns: IoT devices collect vast amounts of data, often without users' explicit consent or knowledge. This data can be mishandled, leading to privacy breaches and potential misuse. 13
  • 14. IoT cyber risks Physical Security: IoT devices deployed in physical environments may be physically accessible to attackers. Tampering with or stealing these devices can compromise security. DDoS Attacks: IoT devices can be hijacked and used as part of botnets to launch Distributed Denial of Service (DDoS) attacks on other systems or networks. Interoperability Issues: IoT devices from different manufacturers may not always work seamlessly together, potentially leading to security vulnerabilities when attempting to integrate them into a larger IoT ecosystem. Supply Chain Risks: Compromised or counterfeit IoT components during the manufacturing and distribution process can introduce vulnerabilities into devices before they even reach the end user. Legacy Devices: Older IoT devices may lack modern security features and cannot be easily updated or replaced, leaving them susceptible to attacks. 14
  • 15. IoT cyber risks Mitigation Change default passwords and usernames on IoT devices. Regularly update device firmware and software. Implement strong encryption and authentication mechanisms. Segment IoT devices from critical networks when possible. Monitor network traffic for unusual activity. Establish and enforce IoT security policies. Educate users and employees about IoT security best practices. 15
  • 16. Follow CyberDost on social media - Get the latest Cyber Safety Tips - Learn about various types of Scam Alerts - Get updates on National and International Cyber news - Learn about the achievements in the attempt to make the nation cyber safe - Become a Cyber Volunteer and share the CyberDost content with your community - Do your bit to stay vigilant and stay cyber safe! 16