This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "Top 10 IoT Vulnerabilities (2014)"

From OWASP
Jump to: navigation, search
(Created page with "For each attack surface areas, the following sections are included: * A description of the attack surface * Threat agents * Attack vectors * Security weaknesses * Technical i...")
 
 
(2 intermediate revisions by the same user not shown)
Line 1: Line 1:
 +
<center>[https://www.owasp.org/index.php/OWASP_Internet_of_Things_Project#tab=Top_10_IoT_Vulnerabilities__282014_29 Back To The Top 10 Iot Vulnerabilities Project]</center>
 +
 
For each attack surface areas, the following sections are included:
 
For each attack surface areas, the following sections are included:
  

Latest revision as of 23:00, 1 December 2015

Back To The Top 10 Iot Vulnerabilities Project

For each attack surface areas, the following sections are included:

  • A description of the attack surface
  • Threat agents
  • Attack vectors
  • Security weaknesses
  • Technical impacts
  • Business impacts
  • Example vulnerabilities
  • Example attacks
  • Guidance on how to avoid the issue
  • References to OWASP and other related resources