Top 10 IoT Vulnerabilities (2014)

From OWASP
Jump to: navigation, search
Back To The Top 10 Iot Vulnerabilities Project

For each attack surface areas, the following sections are included:

  • A description of the attack surface
  • Threat agents
  • Attack vectors
  • Security weaknesses
  • Technical impacts
  • Business impacts
  • Example vulnerabilities
  • Example attacks
  • Guidance on how to avoid the issue
  • References to OWASP and other related resources