Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Threat Modeling for IoT Systems

LASCON via YouTube

Overview

Explore the critical importance of threat modeling for IoT systems in this 49-minute LASCON conference talk. Delve into the challenges and risks associated with the proliferation of IoT devices, which expose unprecedented amounts of personal sensitive data. Learn how to apply threat modeling techniques to IoT systems, helping to build more secure designs and effectively test system security. Discover the components of IoT systems, including supporting web services and client applications, and understand how to identify trust boundaries and data flow paths. Gain insights into IoT security concerns for consumers, enterprises, and developers, and examine specific use cases involving safety concerns, such as in medical devices. Acquire valuable knowledge on threat modeling materials and methodologies to enhance the security of IoT systems during both the design and testing phases.

Syllabus

Introduction
Background
Storytime
Agenda
IoT Overview
IoT Security
Consumers
Enterprise Industry
Developers
Why
Mobile
IoT
Mobile Assessments
Threat Modeling
Use Cases
Safety Concerns
Maximum Overdrive
Medical Devices
Additional Threat Modeling Materials
Closing Thoughts

Taught by

LASCON

Reviews

Start your review of Threat Modeling for IoT Systems

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.