From the course: IT Security Foundations: Core Concepts

Unlock the full course today

Join today to access over 25,200 courses taught by industry experts.

Solution: Recognizing IoT threats

Solution: Recognizing IoT threats

- [Instructor] Okay, now let's check our work. Now, when we go into these different scenarios, we can see what might happen. For example, the smart toy. If compromised, the malicious actor can spy on or interact with the child playing with the toy. And here we see a smart refrigerator. If compromised, the malicious actor can order food or ruin the food by changing the temperature settings. And here's a smart bulb. A malicious actor can turn on all the lights in the home or facility to overload the power system. And many of us have a smart lock. A malicious actor can take control on who gets in or out of the house or facility and a voice activated home automation device. With this, the malicious actor can play their own voice commands or steal voice data as credentials for other voice command systems. And I'm going to scroll down where it will show you more information on what you can do to improve the security of an IoT…

Contents