From the course: Ethical Hacking: Hacking IoT Devices
Unlock the full course today
Join today to access over 24,400 courses taught by industry experts.
Recognizing the challenges of OT
From the course: Ethical Hacking: Hacking IoT Devices
Recognizing the challenges of OT
- [Instructor] Reducing risk when using operational technology can be challenging as a malicious actor can gain access to a system in one of several ways. In this segment, we'll review the challenges of securing operational technology. That includes threats, attacks, and vulnerabilities. If a system is not properly secured, this can make a system vulnerable to threats and attacks. Those include denial of service attacks, viruses and malware, social engineering, and physical attacks. IoT and OT devices are notorious for their poor security and several major exploits have been seen in the wild. Let's review some of the vulnerable components that can occur in operational technology systems that can be exploited by a malicious actor to gain access to the infrastructure. Vulnerabilities can include outdated or flawed software, weak access controls, lack of security patches, and insecure network configurations that can lead to a system compromise. Another issue that can expose a system to…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.