You are on page 1of 3

Lab - Evaluate Recent IoT Attacks

Objectives
Part 1: Research Recent IoT Attacks
Part 2: Describe Mitigation Techniques

Background / Scenario
As the number of IoT devices continue to grow at an exponential rate, so are the number of attacks on these
devices. There are a wide variety of attacks on IoT devices that have been documented and reported on the
news.
As an IT professional working with IoT devices, it is important to be aware of the wide range of attacks and
vulnerabilities that have occurred on these devices. It is also important to know how to defend against and
minimize the damage from these types of attacks.

Required Resources
 PC or mobile device with Internet access

Part 1: Research Recent IoT Attacks


In this part of the lab, you will research and describe three different types of IoT attacks using the following
steps:
a. Launch your favorite web browser and go to your favorite search engine, such as Google.com.
What key terms will you use to search for recent IoT related security attacks?
____________________________________________________________________________________
____________________________________________________________________________________
b. Go through the results and find the most interesting attacks that have occurred within the last 5 years.
c. Choose three different types of attacks to document in this lab.
d. Describe the attacks in detail. Make sure you answer the following questions:
1) What was the name or type of attack?
2) What was targeted?
3) Who was affected?
4) How did the attack occur? Describe the details of what happened.
5) What is the source of your information? Include the URL.

 2018 - 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 1 of 3 www.netacad.com
Lab - Evaluate Recent IoT Attacks

Attack #1:
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
Attack #2:
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
Attack #3:
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________

 2018 - 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 2 of 3 www.netacad.com
Lab - Evaluate Recent IoT Attacks

Part 2: Describe Mitigation Techniques


In this part of the lab, you will reflect on how each of these attacks could be mitigated. For example, you might
research and answer the following questions:
 Could this attack have been prevented?
 Can it be defended against?
 What measures need to be implemented in order to mitigate these attacks or minimize the impact?
 What other information about the attack should be described?
Attack #1:
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
Attack #2:
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
Attack #3:
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________

 2018 - 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 3 of 3 www.netacad.com

You might also like