This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Top 10 IoT Vulnerabilities (2014)
From OWASP
For each attack surface areas, the following sections are included:
- A description of the attack surface
- Threat agents
- Attack vectors
- Security weaknesses
- Technical impacts
- Business impacts
- Example vulnerabilities
- Example attacks
- Guidance on how to avoid the issue
- References to OWASP and other related resources
- I1 Insecure Web Interface
- I2 Insufficient Authentication/Authorization
- I3 Insecure Network Services
- I4 Lack of Transport Encryption
- I5 Privacy Concerns
- I6 Insecure Cloud Interface
- I7 Insecure Mobile Interface
- I8 Insufficient Security Configurability
- I9 Insecure Software/Firmware
- I10 Poor Physical Security