Search Vulnerabilities

 

Last week, you familiarized yourself with IoT and IoMT. The next step is to select and research the two networked IoT or IoMT devices to use in your memo and search for information about their vulnerabilities.

Project Work: Search Vulnerabilities:

Hospitals, manufacturers, government agencies, and other organizations today rely on networked devices. In addition to medical devices such as insulin pumps, drug delivery systems, and implanted cardiac devices, hospitals use other devices like smart security cameras, trackers for equipment, door locks, and vehicle tracking devices for deliveries and transportation.
Learning Resources
Information security vulnerabilities and exposures are important to understand in order to evaluate and ultimately improve security posture by mitigating risks. The resources below will give you more information on how vulnerabilities and exposures are monitored and communicated within the information security industry.
• Vulnerabilities and Exposures
• Common Vulnerabilities and Exposures (CVE) List
☀→ Your task is to check the internet and the Common Vulnerabilities and Exposures (CVE) List for networked IoT or IoMT devices with publicly known problems identified in the past six months.
Select two devices related that might be relevant to the organization setting and review what is known about the vulnerabilities of these devices. You will submit your findings in the Vulnerability Memo.

Our customer support team is here to answer your questions. Ask us anything!