YoVDO

Embedding Security in Embedded Systems

Offered By: YouTube

Tags

Conference Talks Courses Cybersecurity Courses Web Application Security Courses Password Management Courses Embedded Systems Security Courses Firmware Analysis Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore embedded systems security in this 47-minute conference talk from GrrCON 2017. Delve into the world of Internet of Things (IoT) vulnerabilities, examining real-world examples from various industries including automotive, agriculture, and smart buildings. Learn about typical corporate penetration testing, firmware analysis, and the challenges of securing complex ecosystems. Discover the importance of coordinated disclosure, addressing knowledge gaps in cybersecurity, and implementing best practices for securing smart devices. Gain insights on partnering with stakeholders, managing false positives, and navigating the complexities of software decay and lifecycle management in embedded systems.

Syllabus

Intro
Thanks
This years talk is
Who am I
What am I talking about today
What is a typical corporate pen test
What is IoT
Problems with IoT
Examples
Camera Controller
Camera Version Firmware
Shodan
Embedded Systems
Dairy Farm
Mercedes Benz
School
Business
Pool
Jewelry Store
Fingerprinting Systems
Password Change
CVS Search
Firmware
Download Firmware
Coordinated Disclosure
Camera Firmware
Other Embedded Systems
Solar Panels
Embedded IOT
Smart Buildings
Schneider Electric
Schneier
Back Door
Knowledge Gap
Cybersecurity
Web Server
Web Apps
CVS
Whose problem is this
Securing smart buildings
Getting the basics right
Separation
Physically Secure
Software Decay
SDLC
Windows XP
Partners
False positives
Complex ecosystem
Internal stakeholder
Security is hard
Contact information
Hacking back


Related Courses

CompTIA Security+ (SY0-601) Cert Prep: 7 Endpoint Security Design and Implementation
LinkedIn Learning
SSCP Cert Prep: 7 Systems and Application Security
LinkedIn Learning
The Internet of Insecure Things - 10 Most Wanted List
YouTube
ICEFALL - Revisiting A Decade Of OT Insecure-By-Design Practices
Hack In The Box Security Conference via YouTube
Low Level BootROM Protocol Fuzzing Secure Memory Regions
Hack In The Box Security Conference via YouTube