“Smart yet flawed” is the term used by the security software developers when explaining the seriousness of the inherent vulnerabilities of IoT devices. The following table identifies the most common …
The Internet of Things is everything that has an on/off switch with a connection to the internet. In the organisational context, these ‘things’ often actually form part of safety-critical infrastructure …
The Code of Practice: Securing the Internet of Things for Consumers, developed by the Australian Government (the Department of Home Affairs and the Australian Cyber Security Centre), is a voluntary …
IoT applications are growing, but security for IoT projects and deployments remain a major obstacle for both organisations and users. These obstacles include: trusting the identity of the IoT device …
In practical terms, IoT devices go through three key development stages: from the manufacture of the specialised control processors to the delivery of the finished device to the user. These …
The Internet of Things (IoT) refers to the devices or instruments with sensing capability and contextual awareness that are interconnected using the Internet. They collect data, without human intervention, to …
In this era of instant connectivity, our world is increasingly saturated with a wide range of software products and services, and technology devices that are run and managed through firmware. …
You may find the resources mentioned in Week 2 of the course useful to learn more about the concepts you have been introduced to this week. These resources are included …
“Security professionals evaluate threats and vulnerabilities based on the potential impact they have on the confidentiality, integrity, and availability of an organization’s assets—namely, its data, applications, and critical systems.” (F5 …
As organisations embrace new technological innovations such as artificial intelligence (AI) and machine learning to modernise their business operations, the chances of introducing new vulnerabilities to their systems increases, thereby …
Let’s examine how a real-life scenario involving a ransomware attack can be applied and explained to determine targeted precautionary security measures. Watch this video to learn more: This is an …
The U3 (user, usage, and usability) concept is an academic, research-based approach to security design. Human-centric cyber security is an intangible concept that is difficult to define because of the …
The UK’s National Cyber Security Centre (NCSC) advocates Security by Design that goes beyond individual applications and that ensures networks, systems, technologies, and products are all designed and built securely …
Disposing of IoT devices (by discarding or selling them) may give other people easy access to personal and sensitive information. The Australian Cyber Security Centre provides useful information for securing …
What are the major challenges associated with designing IoT applications that are inherently secure? Did you know that access to many security cameras is not effectively secured and that livestreams …