• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Home
  • About
  • Structure
  • Gradebook

ITACS 5211: Introduction to Ethical Hacking

Wade Mackey

Basic rules for securing IoT

October 10, 2018 by Manogna Alahari 1 Comment

Article:  https://krebsonsecurity.com/2018/01/some-basic-rules-for-securing-your-iot-stuff/

Every software design should strictly adhere to cyber principles. On top of that, I strongly believe any software that is being developed should be “secured from design”. Securing the software right from the design phase off the application , should be the primary design checklist.

Below are few what I can think off additionally from what is posted in the above article.
1. SECURE FROM DESIGN – think about security right from the application design phase.
2. LOAD TESTING – DNS servers should have been tested with a high load in their lower environments (performance), to ensure they can manage heavy traffic.
3. DNS servers on CLOUD – cloud has capabilities of autoscaling when the traffic exceeds the threshold additional servers automatically spin up.
4. FAULT TOLERANCE- DNS servers should also think about fault tolerance. Automatically diverting faulty traffic or vice versa

Filed Under: Week 06: Sniffers Tagged With:

Reader Interactions

Comments

  1. Nishit Darade says

    October 10, 2018 at 1:23 pm

    IOT is being involved more and more in our day to day life and we are not aware of it. This are some good points we should follow to secure the IOT devices.

    Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Weekly Discussions

  • Uncategorized (14)
  • Week 01: Overview (7)
  • Week 02: TCP/IP and Network Architecture (18)
  • Week 03: Reconnaisance (17)
  • Week 04: Vulnerability Scanning (19)
  • Week 05: System and User Enumeration (17)
  • Week 06: Sniffers (17)
  • Week 07: NetCat and HellCat (15)
  • Week 08: Social Engineering, Encoding and Encryption (21)
  • Week 09: Malware (14)
  • Week 10: Web Application Hacking (17)
  • Week 11: SQL Injection (15)
  • Week 12: Web Services (25)
  • Week 13: Evasion Techniques (8)
  • Week 14: Review of all topics (15)

Copyright © 2026 · Magazine Pro Theme on Genesis Framework · WordPress · Log in