From the course: Securing the IoT: Privacy

Unlock the full course today

Join today to access over 23,400 courses taught by industry experts.

Challenge: Understanding IoT vulnerabilities

Challenge: Understanding IoT vulnerabilities

From the course: Securing the IoT: Privacy

Challenge: Understanding IoT vulnerabilities

(bright upbeat music) - [Instructor] Let's do a challenge. In this challenge, you'll go to this website, where we can see a list of the top 10 IoT vulnerabilities. These come directly from the OWASP top 10 list. Now, we'll scroll down, and it gives you a little bit of discussion on those top 10, but you could also go right to the source to the OWASP Internet of Things project. Now, I went to this section here, and I selected the infographic, and I opened it up. And that's another way to visualize the top 10 vulnerabilities. Now, once you've read the article, I want you to answer the following questions. Now, we know that there is a top 10 list, but I want you to list and explain the top five, and then answer, "Could these be avoided?" And the last thing is, how would you use this information when purchasing an IoT device? This challenge should take you about 15 minutes. Good luck!

Contents