Главная
Study mode:
on
1
Intro
2
Dyn DNS DDOS Attack
3
Security Benefits of Embedded Linux
4
Remember Two Things
5
Know Your Adversary
6
Operating System Security Patching strategy Minimal distribution
7
File System Security
8
Service Security
9
Network Layer Security
10
Application Security
11
Sensitive Data Exposure
12
Certificate Verification via Fingerprint
13
Encrypting Data
14
Digital Signatures
15
Account Hijacking
16
Replay/Denial of Service
17
Remote Code Execution
Description:
Explore strategies for securing IoT devices against botnet attacks in this informative conference talk. Learn essential steps IoT developers can take to protect their devices from malicious takeovers and prevent them from being used in Distributed Denial of Service (DDoS) attacks. Delve into topics such as embedded Linux security benefits, operating system security, file system protection, service and network layer security, and application security. Discover techniques for safeguarding sensitive data, implementing proper certificate verification, encrypting data, and using digital signatures. Address common vulnerabilities like account hijacking, replay attacks, and remote code execution. Gain valuable insights from Adam Englander, a virtual crime fighter with over 25 years of experience in building communities and applications, as he shares his expertise in battling botnet builders and securing the Internet of Things.

IoT Lockdown - Battling Bot Net Builders

Linux Foundation
Add to list
0:00 / 0:00