From the course: IT Security Foundations: Core Concepts
Unlock this course with a free trial
Join today to access over 25,400 courses taught by industry experts.
Recognizing the Internet of Things
From the course: IT Security Foundations: Core Concepts
Recognizing the Internet of Things
- [Instructor] The Internet of Things represents a collection of devices attached to the internet that collect and exchange data using nodes and controllers. In this segment, we'll discuss some best practice guidelines when dealing with an IoT device. First, let's take a look at some of the many devices that exist to improve our lives. I'm here at this website, where we can see devices that include home automation, healthcare, phones, and wearables. Devices on the Internet of Things pose unique challenges in managing information, as all systems are essentially interconnected. IoT devices can gather petabytes of data on a daily basis. Each IoT device can have an expansive attack surface, which are entry points where we can launch an attack. The attack surface can include things such as weak or missing passwords, outdated software, or physical access to the device. In addition, each IoT device can have several attack vectors…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.