This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "Top 10 IoT Vulnerabilities (2014)"

From OWASP
Jump to: navigation, search
Line 1: Line 1:
<center>[https://www.owasp.org/index.php/OWASP_Internet_of_Things_Project#tab=IoT_Attack_Surface_Areas Back To The IoT Attack Surface Areas Project]</center>
+
<center>[https://www.owasp.org/index.php/OWASP_Internet_of_Things_Project#tab=Top_10_IoT_Vulnerabilities__282014_29 Back To The IoT Attack Surface Areas Project]</center>
  
 
For each attack surface areas, the following sections are included:
 
For each attack surface areas, the following sections are included:

Revision as of 22:59, 1 December 2015

Back To The IoT Attack Surface Areas Project

For each attack surface areas, the following sections are included:

  • A description of the attack surface
  • Threat agents
  • Attack vectors
  • Security weaknesses
  • Technical impacts
  • Business impacts
  • Example vulnerabilities
  • Example attacks
  • Guidance on how to avoid the issue
  • References to OWASP and other related resources