A Practical Method of Finding Vulnerabilities in IoT Devices
Hack In The Box Security Conference via YouTube
Launch a New Career with Certificates from Google, IBM & Microsoft
Start speaking a new language. It’s just 3 weeks away.
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Explore a practical methodology for identifying vulnerabilities in Internet of Things (IoT) devices and analyzing intrusion artifacts in this 23-minute conference talk from the Hack In The Box Security Conference. Learn about the challenges posed by IoT technology as it becomes a new surface for cyber attacks, affecting industries previously unaccustomed to cyber breaches. Discover the importance of post-intrusion processing and damage prevention, as well as the difficulties in responding due to lack of standards and guidelines. Gain insights into an established incident data collection procedure designed to improve intrusion data acquisition for general IoT devices. Presented by IeckChae Euom, Director of the System Security Research Center, Head of the Interdisciplinary Program of Information Security at Chonnam National University, and Assistant Professor and Vice Dean at the Graduate School of Data Science.
Syllabus
#HITB2023HKT #COMMSEC D2 - A Practical Method Of Finding Vulnerabilities In IoT - IeckChae Euom
Taught by
Hack In The Box Security Conference