This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Top 10 IoT Vulnerabilities (2014)

From OWASP
Revision as of 02:42, 30 November 2015 by Craig Smith (talk | contribs) (Created page with "For each attack surface areas, the following sections are included: * A description of the attack surface * Threat agents * Attack vectors * Security weaknesses * Technical i...")

(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to: navigation, search

For each attack surface areas, the following sections are included:

  • A description of the attack surface
  • Threat agents
  • Attack vectors
  • Security weaknesses
  • Technical impacts
  • Business impacts
  • Example vulnerabilities
  • Example attacks
  • Guidance on how to avoid the issue
  • References to OWASP and other related resources