• Skip to main content
  • (617)933-5060
  • Remote Assistance
  • Customer Portal
  • info@oramca.com
  • Remote Assistance
  • Customer Portal
  • info@oramca.com
Facebook-f Twitter Linkedin-in
  • Home
  • About Us
    • Our People
  • How we Help
  • Blog
  • Learning Center
  • Case studies
  • Testimonials
  • Contact Us
    • Remote Assistance
    • Customer Portal
  • Home
  • About Us
    • Our People
  • How we Help
  • Blog
  • Learning Center
  • Case studies
  • Testimonials
  • Contact Us
    • Remote Assistance
    • Customer Portal

20 questions to ask about your IoT security

November 22, 2016 by securewebsite

20 questions to ask about your IoT security

 

With the recent DDoS attack that utilized IoT devices to shut down major internet traffic, security of these devices is in the spotlight. The market continues to grow with devices filling up our smart homes, cities and businesses. You may be concerned about your lack of a testing procedure for these. Or maybe you have one defined but want to know if it’s sufficient. Below you’ll find 20 questions to ask when testing the security of your IoT devices, based on the Open Web Application Security Project (OWASP), which put forth excellent testing guidelines for securing Internet of Things devices. For more detailed information, stop on by the OWASP website or give us a call.

  1. Are weak passwords allowed?
  2. Does transmitted info use HTTPS?
  3. Will the account lock a user out after multiple failed logins?
  4. Is the web interface vulnerable to XSS, SQLi or other web app vulnerabilities?
  5. Is two-factor authentication implemented?
  6. What are password recovery mechanisms?
  7. Do passwords expire?
  8. Can a user change the default username and password?
  9. What personal information is collected?
  10. Is personal data encrypted both at rest and in transit?
  11. Is data de-identified?
  12. Lack of Transport Encryption
  13. Is a firewall option available?
  14. Are security events logged?
  15. Can you enable AES-256 encryption?
  16. Is there an unnecessary USB port that would allow physical access?
  17. Does it have update capabilities, and when it updates, are the files encrypted?
  18. Prior to installing, does the device require signed files?
  19. How does it respond to buffer overflow or denial of service attacks?
  20. Are any test ports present?

Filed Under: Small Business

  • Home
  • About Us
    • Our People
  • How we Help
  • Blog
  • Learning Center
  • Case studies
  • Testimonials
  • Contact Us
    • Remote Assistance
    • Customer Portal

© ORAM Corporate Advisors 2019. All rights reserved | Policy & Privacy