Overview
Explore the critical importance of threat modeling for IoT systems in this 49-minute LASCON conference talk. Delve into the challenges and risks associated with the proliferation of IoT devices, which expose unprecedented amounts of personal sensitive data. Learn how to apply threat modeling techniques to IoT systems, helping to build more secure designs and effectively test system security. Discover the components of IoT systems, including supporting web services and client applications, and understand how to identify trust boundaries and data flow paths. Gain insights into IoT security concerns for consumers, enterprises, and developers, and examine specific use cases involving safety concerns, such as in medical devices. Acquire valuable knowledge on threat modeling materials and methodologies to enhance the security of IoT systems during both the design and testing phases.
Syllabus
Introduction
Background
Storytime
Agenda
IoT Overview
IoT Security
Consumers
Enterprise Industry
Developers
Why
Mobile
IoT
Mobile Assessments
Threat Modeling
Use Cases
Safety Concerns
Maximum Overdrive
Medical Devices
Additional Threat Modeling Materials
Closing Thoughts
Taught by
LASCON