1.2.3-Lab - Learning-The-Details-Of-Attacks

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 3

Lab - Learning the Details of Attacks

Objectives
Research and analyze IoT application vulnerabilities.
Part 1: Conduct a Search of IoT Application Vulnerabilities

Background / Scenario
The Internet of Things (IoT) consists of digitally connected devices that are connecting every aspect of our lives,
including our homes, offices, cars, and even our bodies to the internet. With the accelerating adoption of IPv6 and the
near universal deployment of Wi-Fi networks, the IoT is growing at an exponential pace.
According to Statista, industry experts estimate that by 2030, the number of active IoT devices will approach 50 billion.
However, IoT devices are particularly vulnerable to security threats because security has not always been considered in
IoT product design. Also, IoT devices are often sold with old and unpatched embedded operating systems and software.

Required Resources
 PC or mobile device with internet access

Instructions

Part 1: Conduct a Search of IoT Application Vulnerabilities


Using your favorite search engine, conduct a search for Internet of Things (IoT) vulnerabilities. During your search,
find an example of an IoT vulnerability for each of the IoT verticals: industry, energy systems, healthcare, and
government. Be prepared to discuss who might exploit the vulnerability and why, what caused the vulnerability, and
what could be done to limit the vulnerability.
Note: You can use the web browser in the virtual machine that was installed in a previous lab to research security
issues. By using the virtual machine, you may prevent malware from being installed on your computer.
From your research, choose an IoT vulnerability and answer the following questions:

a. What is the vulnerability?

In cyber security, vulnerability is weakness in IT system that can be attacked by hacker.

b. Who might exploit it? Explain.

Vulnerability can be exploited by individuals or groups with malicious intent, commonly refereed to as attacker or hackers. These
individuals may have various motivations, including financial gain, political reasons, espionage , activism or simply desire to
disrupt the system. Here are some categories of actors who might exploit vulnerability:

Cybercriminals, Hackvisits, Nation state Actors, Insiders, Scripy Kiddies, Black hat hackers, White hat hackers

 2018 - 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 1 of 3 www.netacad.com
Cybercriminals often exploit vulnerabilities to gain unauthorized access to systems and networks, steal sensitive data , commit
financial fraud or launch ransomware attack with the intention of extorting money.

Hackvisits are activist with hacking skills may exploit vulnerabilities to further thier social and political issues.

Nation state actor are government sponsored entities may exploit vulnerability for cyber welfare to gain strategic advantage over
other nations.

 2018 - 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 2 of 3 www.netacad.com
Lab - Learning the Details of Attacks

c. Why does the vulnerability exist?

Vulnerability exists due to confusion, There are two primitives in this digital world.. One is code and
other is data.. When data considered as code by a system and starts executing data as code will lead to
unexpected results , these deviations from expected results is called bug.

d. What could be done to limit the vulnerability?


Here are some common factors contributing to the existence of vulnerabilities and potential ways to limit them:
Fixing software bugs and error, Prevention inadequate security practice, complexity of system, lack of user awareness, insufficient
testing and validation, human factors.

 2018 - 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 3 of 3 www.netacad.com

You might also like