You are on page 1of 4

Lab - Learning the Details of Attacks

Objectives
Research and analyze IoT application
vulnerabilities.
Part 1: Conduct a Search of IoT
Application Vulnerabilities
Background / Scenario
The Internet of Things (IoT) consists of
digitally connected devices that are
connecting every aspect of our lives,
including our homes, offices, cars, and even
our bodies to the internet. With the
accelerating adoption of IPv6 and the near
universal deployment of Wi-Fi networks, the
IoT is growing at an exponential pace.
According to Statista, industry experts
estimate that by 2030, the number of active
IoT devices will approach 50 billion.
However, IoT devices are particularly
vulnerable to security threats because

 2018 - 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 1 of 4 www.netacad.com
Lab - Learning the Details of Attacks

security has not always been considered in


IoT product design. Also, IoT devices are
often sold with old and unpatched embedded
operating systems and software.
Required Resources
 PC or mobile device with internet access
Instructions
Part 1: Conduct a Search of IoT Application
Vulnerabilities
Using your favorite search engine, conduct a
search for Internet of Things (IoT)
vulnerabilities. During your search, find an
example of an IoT vulnerability for each of the
IoT verticals: industry, energy systems,
healthcare, and government. Be prepared to
discuss who might exploit the vulnerability
and why, what caused the vulnerability, and
what could be done to limit the vulnerability.
Note: You can use the web browser in the
virtual machine that was installed in a
previous lab to research security issues. By
 2018 - 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 2 of 4 www.netacad.com
Lab - Learning the Details of Attacks

using the virtual machine, you may prevent


malware from being installed on your
computer.
From your research, choose an IoT
vulnerability and answer the following
questions:
Questions:
a. What is the vulnerability?
Ans: Having insecure network services
can be a high risk vulnerability. They
allow opened doors to be accessed by
hackers to steal data and information.
b. Who might exploit it? Explain.
Ans: Internet network services are
exploited if any ports are opened on the
network for attackers to target.
Hackers will write a code to weaken the
network, making it vulnerable. An
attacker can scan the server for any
opened ports and find vulnerable
services on the network. If insecure
network services are detected, hacker
 2018 - 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 3 of 4 www.netacad.com
Lab - Learning the Details of Attacks

can exploit vulnerabilities in the service


like buffer overflows or denial of service.
c. Why does the vulnerability exist?
Ans: It exist because, users have a lack
of security onto their network, leaving
them vulnerable for attackers to
intervene with the network and steal
data.
d. What could be done to limit the
vulnerability?
Ans: To prevent further attacks on the
network services, identify all services
that are required to be open, only ports
which are used by these services. All
other ports should be closed by setting
up a firewall. To block anonymous users
entering the network.
Type your answers here.

End of document

 2018 - 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 4 of 4 www.netacad.com

You might also like