What is IoT?
A.k.a. Internet of Everything. Refers to the network of devices with an IP address, that have the capability of sensing, collecting, and analyzing data. A thing is referred to as the device implanted on natural man-made or machine-made objects and having the functionality of communicating over the network.
How does IoT work?
What is the architecture of IoT?
What are the different IoT technologies and protocols?
What are the IoT Communication Models?
What are the challenges/concerns of IoT security?
What are the top 10 IoT Vulnerabilities?
What are the IoT attack surface areas?
What are some IoT threats?
What is the IoT Hacking Methodology?
How can you defend against IoT Hacking?
What are general guidelines for IoT device manufacturing companies?
What are the IoT Vulnerabilities?
What are SDR-Based Attacks on IoT?
Attackers use Software Defined Radio (SDR) to examine the communication signals in the IoT network and sends spam content or texts to the interconnected devices. Can also change the transmission and reception of signals between the devices.
What is DNS rebinding?
A process of gaining access over the victim’s router using a malicious JavaScript code injected on a web page. After that, an attacker can assault any device activated using the default password.
What are Fault Injection Attacks?
(aka Perturbation attacks), Occur when a perpetrator injects any faulty or malicious program into the system to compromise the system security.
What is FCC ID Search?
Helps in finding the details and granted certification of the devices. Contains 2 elements: Grantee ID and Product ID. Attacker can find underlying vulnerabilities.
What is OT (Operational Technology)?
The software and hardware designed to detect or cause changes in industrial operations through direct monitoring and/or controlling of industrial physical devices. Consists of Industrial Control Systems (ICS) that include Supervisory Control and Data Acquisition (SCADA), Remote Terminal Units (RTU), Programmable Logic Controllers (PLC), Distributed Control System (DCS), etc., to monitor and control operations.
What are some important OT terms?
What is IT/OT convergence?
The integration of IT computing systems and OT operation monitoring systems to bridge the gap between IT/OT technologies for improving overall security, efficiency, and productivity. Can enable smart manufacturing known as industry 4.0. Using this IoT can be referred to as Industrial Internet of Things (IIoT).
What is the Purdue Model?
Used to describe internal connections and dependencies of important components in the ICS networks. Consists of 3 zones: IT, OT, and DMZ.
What are the challenges of OT?
What is the Industrial Control System (ICS)?
A collection of a different types of control systems. Consists of several types of control systems like SCADA, DCS, BPCS, SIS, HMI, PLCs, RTU, IED, etc. Can be configured in 3 modes: Open mode, closed loop, and manual mode.
What are the OT vulnerabilities?