Farhan_Mohd_IST_110_Lab_IoT_Vulnerabilities_rev4
.docx
keyboard_arrow_up
School
Greenville Technical College *
*We aren’t endorsed by this school
Course
110
Subject
Information Systems
Date
Feb 20, 2024
Type
docx
Pages
5
Uploaded by DoctorStrawSparrow4
GTC IST-110 Lab:
IoT Application Vulnerabilities
Objectives
Research and analyze IoT application vulnerabilities
Background / Scenario
The Internet of Things (IoT) consists of digitally connected devices that are connecting every aspect
of our lives, including our homes, offices, cars, and even our bodies to the Internet. With the accelerating adoption of IPv6 and the near universal deployment of Wi-Fi networks, the IoT is growing at an exponential pace. Industry experts estimate that by 2025, the number of active IoT devices will approach 30 billion. IoT devices are particularly vulnerable to security threats because security has not always been considered in IoT product design. Also, IoT devices are often sold with old and unpatched embedded operating systems and software.
Table:
(Statista 2022)
Internet of Things (IoT) and non-IoT active device connections worldwide from 2010 to 2025
(in billions)
GTC - CPT Dept
Page 1
of 5 IST 110 Lab
GTC IST-110 Lab:
IoT Application Vulnerabilities
Required Resources
PC or mobile device with Internet access
Part 1:
Conduct a Search of IoT Application Vulnerabilities
Using your favorite search engine, conduct a search for Internet of Things (IoT) vulnerabilities. During your search, find an example of an IoT vulnerability for each of the IoT verticals: industrial, energy systems, healthcare, and government. Be prepared to discuss who might exploit the vulnerability and why, what caused the vulnerability, and what could be done to limit the vulnerability? Some suggested resources to get started on your search are listed below:
Cisco IoT Resources
https://www.cisco.com/c/en/us/solutions/internet-of-things/overview.html
IoT Security Foundation
https://www.businessinsider.com/iot-cyber-security-hacking-problems-internet-of-things-
2016-3
Business Insider IoT security threats
https://www.iotsecurityfoundation.org/
Note: Do not be repetitive on verticals as this will incur points deduction
Part 2:
Research - Industrial
Based upon your research (from Part 1):
1.
What is the vulnerability?
(1 to 2 sentences minimum)
Vulnerabilities existed in Siemens industrial controllers allowing unauthorized configuration changes and stops of safety systems.
2.
Who might exploit it? Explain.
(2 to 3 sentences minimum)
Nation state actors or hackers could exploit it to cause physical damage by disrupting industrial processes.
3.
Why does the vulnerability exist?
(2 to 3 sentences minimum)
The vulnerability existed due to lack of secure development practices and failure to apply necessary patches by plant operators.
GTC - CPT Dept
Page 2
of 5 IST 110 Lab
GTC IST-110 Lab:
IoT Application Vulnerabilities
4.
What could be done to limit the vulnerability?
(2 to 3 sentences minimum)
Implementing automatic patching, access controls, and monitoring for unauthorized changes could help limit the vulnerability.
5.
List URLS referenced (functional links required)
https://www.wired.com/story/siemens-fix-urgent-iot-flaws/
Part 3:
Research - Energy Systems
Based upon your research (from Part 1):
6.
What is the vulnerability? (1 to 2 sentences minimum)
A vulnerability existed in smart street lights allowing flickering or complete shut off.
7.
Who might exploit it? Explain.
(2 to 3 sentences minimum)
Criminal hackers could exploit it to cause public disturbance or disrupt services workers rely on like emergency response at night.
8.
Why does the vulnerability exist?
(2 to 3 sentences minimum)
The vulnerability existed because default credentials were not changed during deployment.
9.
What could be done to limit the vulnerability?
(2 to 3 sentences minimum)
Requiring strong, unique credentials and regular firmware updates could help limit the vulnerability.
10. List URLS referenced (functional links required) (1 to 2 sentences minimum)
https://www.bankinfosecurity.com/smart-city-vulnerabilities-put-millions-
lights-risk-a-9762
Part 4:
Research - Healthcare
Based upon your research (from Part 1):
GTC - CPT Dept
Page 3
of 5 IST 110 Lab
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help