From the course: Ethical Hacking: Hacking IoT Devices

Unlock the full course today

Join today to access over 24,400 courses taught by industry experts.

Recognizing the challenges of OT

Recognizing the challenges of OT

- [Instructor] Reducing risk when using operational technology can be challenging as a malicious actor can gain access to a system in one of several ways. In this segment, we'll review the challenges of securing operational technology. That includes threats, attacks, and vulnerabilities. If a system is not properly secured, this can make a system vulnerable to threats and attacks. Those include denial of service attacks, viruses and malware, social engineering, and physical attacks. IoT and OT devices are notorious for their poor security and several major exploits have been seen in the wild. Let's review some of the vulnerable components that can occur in operational technology systems that can be exploited by a malicious actor to gain access to the infrastructure. Vulnerabilities can include outdated or flawed software, weak access controls, lack of security patches, and insecure network configurations that can lead to a system compromise. Another issue that can expose a system to…

Contents