This course introduces the Internet of Things (IoT), its building blocks, protocols and the security challenges that the IoT currently faces. The course discusses several IoT attacks and analyses these with a view to encouraging the student to think about ways in which the affected IoT nodes and networks can be better protected.
18 CPE CREDITS
THE COURSE IS SELF-PACED AND PRE-RECORDED
None of the material presented within or as part of this course may be used for malicious purposes. Using whatever they learn on this course, the student bears all responsibility for the consequences of their intentions and actions. The materials presented are for the purpose of learning and, by taking this course, students agree that the knowledge and skills gained may not be exploited for malicious purposes.
This course covers:
• An introduction to the Internet of Things (IoT)
• Threat points within the IoT
• The current vulnerabilities that affect the IoT
• Exploiting the relevant threat points
• The UK laws that apply to cybercrimes and to the IoT
You will need:
• An enthusiastic interest in the IoT and cybersecurity
• Some research skills
• Some basic computing and especially cybersecurity knowledge, e.g. IP addresses, port numbers, and communications protocols, such as Bluetooth and WiFi
• Access to the Internet to view online videos and access referenced resources
• Optional for hands-on practice: your own IoT device with relevant analysis tools to try some of the referenced exercises in their own control environment
Module 1: Introduction to The Internet of Things (IoT)
Module 1 Summary: This module defines the Internet of Things (IoT), discusses some IoT real-world use cases including in the areas of Healthcare, Homes, Transportation, Energy, Wearables and Cities. This module also looks at different IoT protocols, ports, terminologies, and example IoT Architectures.
Module 1 Exercises and Research Tasks:
To complete this module students will be required to answer some questions on several topic areas including on IoT protocols, networking and basic security.
Module 2: Threats, Vulnerabilities, Attacks, and United Kingdom Laws.
Module 2 Summary: In this module, we will review security measures currently employed in the IoT and explore the adequacy or otherwise of these measures. This will form the backdrop for a discussion on the different threat points which can be exploited as part of a cyber-physical security exercise or attack.
Module 2 Exercises and Research Tasks:
To complete this module students will be required to firstly answer two (2) questions: one on IoT security challenges and the other on secure IoT network design. Secondly, the students will be required to answer questions on Laws (UK and in their own current location) that apply to cyber, digital and computer crimes.
Module 3: Cyber-physical attacks on IoT devices – some examples.
Module 3 Summary: This module reviews several IoT-related “attack” exercises. We will look in detail at vulnerabilities and exposures in some IoT devices and discuss how identified vulnerabilities and/or non-secure protocol implementations, etc. in Baby monitors, Fridges and Autonomous Vehicles can be exploited.
The course ends with final exam that will consist of 25 multiple choice and open questions.
Your Instructor: Edewede Oriwoh (MSc, PhD)
Edewedeis a Cyber-security and cyber–physical security expert, a Digital Forensics professional, an Incident Response Specialist, a Guest Speaker, and an Author. She has extensive experience with setting up hacking exercises and is an enthusiastic cyber-security evangelist.