{"id":633,"date":"2024-03-14T22:57:27","date_gmt":"2024-03-15T02:57:27","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/?p=633"},"modified":"2024-04-10T17:59:01","modified_gmt":"2024-04-10T21:59:01","slug":"in-this-module-you-learnt-about-vulnerabilities-in-many-aspects-of-information-technology-in-this-modern-era-iot-or-internet-of-things-is-gaining-popularity-however-the-question-is-are-they-secure","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/2024\/03\/14\/in-this-module-you-learnt-about-vulnerabilities-in-many-aspects-of-information-technology-in-this-modern-era-iot-or-internet-of-things-is-gaining-popularity-however-the-question-is-are-they-secure\/","title":{"rendered":"Module 9: In this module you learnt about vulnerabilities in many aspects of Information Technology. In this modern era IOT or Internet of Things is gaining popularity. However the question is are they secure? Or vulnerable? Watch this video on \u201cInternet of Things Security\u201d and give your opinions on the question above. The speaker puts forward an example of how he unlocked a smart padlock using the Bluetooth feature of a smartphone. Do some research and provide another example of how an IOT device had been compromised using a vulnerability."},"content":{"rendered":"\n<figure class=\"wp-block-embed is-type-video is-provider-ted wp-block-embed-ted wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"Ken Munro: Internet of Things Security\" src=\"https:\/\/embed.ted.com\/talks\/ken_munro_internet_of_things_security\" width=\"676\" height=\"381\" frameborder=\"0\" scrolling=\"no\" webkitAllowFullScreen mozallowfullscreen allowFullScreen><\/iframe>\n<\/div><\/figure>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<p>This question appears many times throughout the topic of cybersecurity. As technology advances so do threats. I do believe there is also competition or race by company to release products before a competitor which can lead to vulnerabilities being overlooked. While it may be convenient that does not make it secure. While the companies will go and fix the issue once it has been found, it is typically found after someone has or has attempted to exploit it. In March 2021 attackers used recognized administrative credentials found online to hack into Verkada. Verkada is a video surveillance system that is cloud-based. This led to private information and video surveillance cameras being accessed. The private companies used by Verkada ranged from factories, hospitals, schools, etc. When it was found, over 100 employee accounts had been upgraded to a &#8220;super user\/admin&#8221; privilege. Threats or attacks are not always announced so determining a true number can prove difficult.&nbsp;<\/p>\n\n\n\n<p><strong>Resources:<\/strong><\/p>\n\n\n\n<p>Munro, K. (n.d.).&nbsp;<em>Internet of things security<\/em>&nbsp;[Video]. TED Talks.&nbsp;https:\/\/www.ted.com\/talks\/ken_munro_internet_of_things_security<\/p>\n\n\n\n<p>Uberoi, A. (n.d.).&nbsp;<em>IoT Security: 5 cyber-attacks caused by IoT security vulnerabilities<\/em>.&nbsp;https:\/\/www.cm-alliance.com\/cybersecurity-blog\/iot-security-5-cyber-attacks-caused-by-iot-security-vulnerabilities<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This question appears many times throughout the topic of cybersecurity. As technology advances so do threats. I do believe there is also competition or race by company to release products before a competitor which can lead to vulnerabilities being overlooked&#8230;. <a class=\"more-link\" href=\"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/2024\/03\/14\/in-this-module-you-learnt-about-vulnerabilities-in-many-aspects-of-information-technology-in-this-modern-era-iot-or-internet-of-things-is-gaining-popularity-however-the-question-is-are-they-secure\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":27258,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[17],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-json\/wp\/v2\/posts\/633"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-json\/wp\/v2\/users\/27258"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-json\/wp\/v2\/comments?post=633"}],"version-history":[{"count":3,"href":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-json\/wp\/v2\/posts\/633\/revisions"}],"predecessor-version":[{"id":741,"href":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-json\/wp\/v2\/posts\/633\/revisions\/741"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-json\/wp\/v2\/media?parent=633"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-json\/wp\/v2\/categories?post=633"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-json\/wp\/v2\/tags?post=633"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}