
By Peter Silva | Article Rating: |
|
August 17, 2014 08:15 PM EDT | Reads: |
8,796 |
The Open Web Application Security Project (OWASP) is focused on improving the security of software. Their mission is to make software security visible, so that individuals and organizations worldwide can make informed decisions about true software security risks and their OWASP Top 10 provides a list of the 10 Most Critical Security Risks. For each risk it provides a description, example vulnerabilities, example attacks, guidance on how to avoid and references to OWASP and other related resources. Many of you are familiar with their Top 10 Most Critical Web Application Security Risks. They provide the list for awareness and guidance on some of the critical web applications security areas to address. It is a great list and many security vendors point to it to show the types of attacks that can be mitigated.
Now the Internet of Things (IoT) has its own OWASP Top 10.
If you’ve lived under a rock for the past year, IoT or as I like to call it, the Internet of Nouns, is this era where everyday objects – refrigerators, toasters, thermostats, cars, sensors, etc – are connected to the internet and can send and receive data. There have been tons of articles covering IoT over the last 6 months or so, including some of my own.
The OWASP Internet of Things (IoT) Top 10 is a project designed to help vendors who are interested in making common appliances and gadgets network/Internet accessible. The project walks through the top ten security problems that are seen with IoT devices, and how to prevent them.
The OWASP Internet of Things Top 10 – 2014 is as follows:
- 1 Insecure Web Interface
- 2 Insufficient Authentication/Authorization
- 3 Insecure Network Services
- 4 Lack of Transport Encryption
- 5 Privacy Concerns
- 6 Insecure Cloud Interface
- 7 Insecure Mobile Interface
- 8 Insufficient Security Configurability
- 9 Insecure Software/Firmware
- 10 Poor Physical Security
You can click on each to get a detailed view on the threat agents, attack vectors, security weaknesses, along with the technical and business impacts. They also list any privacy concerns along with example attack scenarios. Good stuff!
ps
Related:
- The Icebox Cometh
- The Applications of Our Lives
- Standards for ‘Things’
- Securing the Internet of Things: is the web already breaking up?
- 4 things that will happen in the Internet of Things space in 2014
- Tech’s brightest unconvinced by internet of things
- OWASP Internet of Things Top 10
Connect with Peter: | Connect with F5: |
![]() ![]() ![]() |
![]() ![]() ![]() ![]() |
Published August 17, 2014 Reads 8,796
Copyright © 2014 SYS-CON Media, Inc. — All Rights Reserved.
Syndicated stories and blog feeds, all rights reserved by the author.
More Stories By Peter Silva
Peter is an F5 evangelist for security, IoT, mobile and core. His background in theatre brings the slightly theatrical and fairly technical together to cover training, writing, speaking, along with overall product evangelism for F5. He's also produced over 350 videos and recorded over 50 audio whitepapers. After working in Professional Theatre for 10 years, Peter decided to change careers. Starting out with a small VAR selling Netopia routers and the Instant Internet box, he soon became one of the first six Internet Specialists for AT&T managing customers on the original ATT WorldNet network.
Now having his Telco background he moved to Verio to focus on access, IP security along with web hosting. After losing a deal to Exodus Communications (now Savvis) for technical reasons, the customer still wanted Peter as their local SE contact so Exodus made him an offer he couldn’t refuse. As only the third person hired in the Midwest, he helped Exodus grow from an executive suite to two enormous datacenters in the Chicago land area working with such customers as Ticketmaster, Rolling Stone, uBid, Orbitz, Best Buy and others.
Writer, speaker and Video Host, he's also been in such plays as The Glass Menagerie, All’s Well That Ends Well, Cinderella and others.
![]() Feb. 27, 2017 03:30 AM EST Reads: 2,158 |
By Elizabeth White ![]() Feb. 27, 2017 02:00 AM EST Reads: 7,517 |
By Elizabeth White ![]() Feb. 27, 2017 01:00 AM EST Reads: 2,098 |
By Carmen Gonzalez ![]() Feb. 26, 2017 11:45 PM EST Reads: 2,146 |
By Pat Romanski ![]() Feb. 26, 2017 11:45 PM EST Reads: 6,252 |
By Carmen Gonzalez ![]() Feb. 26, 2017 10:00 PM EST Reads: 13,755 |
By Yeshim Deniz ![]() Feb. 26, 2017 09:15 PM EST Reads: 2,529 |
By Elizabeth White ![]() Feb. 26, 2017 09:00 PM EST Reads: 9,039 |
By Carmen Gonzalez ![]() Feb. 26, 2017 08:45 PM EST Reads: 2,073 |
By Elizabeth White ![]() Feb. 26, 2017 08:45 PM EST Reads: 5,234 |
By Liz McMillan ![]() Feb. 26, 2017 08:30 PM EST Reads: 7,249 |
By Yeshim Deniz ![]() Feb. 26, 2017 08:30 PM EST Reads: 842 |
By Carmen Gonzalez ![]() Feb. 26, 2017 07:45 PM EST Reads: 2,144 |
By Yeshim Deniz ![]() Feb. 26, 2017 06:45 PM EST Reads: 2,460 |
By Liz McMillan ![]() Feb. 26, 2017 05:30 PM EST Reads: 2,323 |
By Carmen Gonzalez ![]() Feb. 26, 2017 05:15 PM EST Reads: 1,998 |
By Elizabeth White ![]() Feb. 26, 2017 03:45 PM EST Reads: 2,757 |
By Carmen Gonzalez ![]() Feb. 26, 2017 03:30 PM EST Reads: 9,036 |
By Pat Romanski ![]() Feb. 26, 2017 02:30 PM EST Reads: 7,208 |
By Carmen Gonzalez ![]() Feb. 26, 2017 02:30 PM EST Reads: 2,527 |