YoVDO

Threat Modeling for IoT Systems

Offered By: LASCON via YouTube

Tags

LASCON Courses IoT security Courses Threat Modeling Courses

Course Description

Overview

Explore the critical importance of threat modeling for IoT systems in this 49-minute LASCON conference talk. Delve into the challenges and risks associated with the proliferation of IoT devices, which expose unprecedented amounts of personal sensitive data. Learn how to apply threat modeling techniques to IoT systems, helping to build more secure designs and effectively test system security. Discover the components of IoT systems, including supporting web services and client applications, and understand how to identify trust boundaries and data flow paths. Gain insights into IoT security concerns for consumers, enterprises, and developers, and examine specific use cases involving safety concerns, such as in medical devices. Acquire valuable knowledge on threat modeling materials and methodologies to enhance the security of IoT systems during both the design and testing phases.

Syllabus

Introduction
Background
Storytime
Agenda
IoT Overview
IoT Security
Consumers
Enterprise Industry
Developers
Why
Mobile
IoT
Mobile Assessments
Threat Modeling
Use Cases
Safety Concerns
Maximum Overdrive
Medical Devices
Additional Threat Modeling Materials
Closing Thoughts


Taught by

LASCON

Related Courses

A developer's guide to the Internet of Things (IoT)
IBM via Coursera
Enterprise and Infrastructure Security
New York University (NYU) via Coursera
Getting Started with the Internet of Things (IoT)
Microsoft via edX
AWS IoT: Developing and Deploying an Internet of Things
Amazon Web Services via edX
Components And Applications Of Internet Of Things
Indian Institute of Technology Patna via Swayam