This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Top 10 IoT Vulnerabilities (2014)

From OWASP
Revision as of 22:59, 1 December 2015 by Craig Smith (talk | contribs)

Jump to: navigation, search
Back To The IoT Attack Surface Areas Project

For each attack surface areas, the following sections are included:

  • A description of the attack surface
  • Threat agents
  • Attack vectors
  • Security weaknesses
  • Technical impacts
  • Business impacts
  • Example vulnerabilities
  • Example attacks
  • Guidance on how to avoid the issue
  • References to OWASP and other related resources