{"id":2340,"date":"2018-10-10T16:11:58","date_gmt":"2018-10-10T16:11:58","guid":{"rendered":"https:\/\/www.varutra.com\/blog\/?p=1590"},"modified":"2022-12-02T15:48:11","modified_gmt":"2022-12-02T10:18:11","slug":"basics-of-internet-of-things-iot-security-testing","status":"publish","type":"post","link":"https:\/\/www.varutra.com\/varutravrt3\/basics-of-internet-of-things-iot-security-testing\/","title":{"rendered":"Introduction to Internet of Things (IoT)"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" width=\"1920\" height=\"1080\" src=\"https:\/\/varutra-1a3b6.kxcdn.com\/wp-content\/uploads\/2018\/10\/BO650X305.jpg\"  class=\"sh-overlay-item sh-table-cell ls-is-cached lazyloaded\" data-rel=\"lightcase\" title=\"BO650X305 - Varutra Consulting\"><br \/>\n<strong>Introduction to Internet of Things (IoT) and IoT Security Challenges<\/strong><\/p>\n<p>Information security, often referred to as InfoSec, is a set of strategies to protect sensitive business information from unauthorized use, modification, disruption, destruction, recording or inspection. InfoSec does not only protect information in transit but also at rest in storage.<\/p>\n<p>InfoSec programs are built around the core objectives of the CIA triad and its primary focus is on sustaining the balance between Confidentiality, Integrity and Availability of business data. This triad ensures that sensitive information is only disclosed to authorized parties (confidentiality), prevent unauthorized modification of data (integrity) and guarantee the data can be accessed by authorized parties when requested (availability).<\/p>\n<p>&nbsp;<\/p>\n<h3><strong>Is there any difference between cyber security and information security?<\/strong><\/h3>\n<p>Yes! They are both different. Although they are used interchangeably and they both deal with security and protection of information from breaches (information being stolen) and threats but cyber security deals with protecting data in cyber space whereas information security protects data in general.<\/p>\n<p>As it is well known:<\/p>\n<p><strong><em>\u201cPhysical data is often easier to protect in locked filing cabinets, but electronic data requires greater protection\u201d<\/em><\/strong><\/p>\n<p>The field is of growing importance due to increasing dependency on computer systems, the Internet and wireless networks such as Bluetooth and Wi-Fi, and due to the growth of &#8220;smart&#8221; devices, including smartphones, televisions and the various other small devices that constitute the Internet of Things.<\/p>\n<p>&nbsp;<\/p>\n<h3><strong>What exactly is Internet of Things?<\/strong><\/h3>\n<p style=\"text-align: left\">Internet of Things (IoT) basically includes anything and everything connected to the internet or to each other. These things are always connected, communicate with each other, swapping data with devices and finally uploading it all to the cloud based server. With an increasing pressure in terms of competition to deliver better and fast services, there is a need for the data to travel from any device in the world to provide more perception and control over the elements in our connected lives.<\/p>\n<p>Doesn\u2019t it make one\u2019s life easy? What can one do using a normal alarm clock apart from setting alarm? Snooze time, set multiple alarms etc. With IoT based alarm clocks, if a user sets alarm at 8 am to go to work, this alarm would fetch real time weather and traffic data in order to calculate time required to commute to work and automatically ring some time prior to what is set to compensate for the time delay. The benefits of IoT include efficient resource utilization, reduced human efforts, reduced costs and increasing productivity, real-time marketing, decision analytics, better customer experiences, high-quality data, to name a few. But nothing comes easy! Along with all the comfort it provides, we all should not ignore the risks it brings with it.<\/p>\n<p>IoT security testing is considered less complex and has not been given importance that it deserves, considering it has no human intervention there will be no human error. Human error is the major cause of security breaches, for example a user clicking on a malicious link in an email or is lured into sending their personal details. All this needs human intervention. Therefore, in IoT environment, as there is no one to lure and hence less security challenges or breaches. This supposition is totally deceptive. According to recent research on IoT breaches, it was found that 84% of companies have already experienced some sort of IoT breach in a study involving over 3,000 companies across 20 countries. In fact, in an IoT environment, intruders have more opportunities to breach as its architecture comprises a number of elements that become potential hacker\u2019s targets.<\/p>\n<p>&nbsp;<\/p>\n<h3><strong>How IoT Evolved?<\/strong><\/h3>\n<p>IoT is one of the trending topics in the field of Information Technology but let\u2019s also have a quick review of its background and existence.<\/p>\n<p>The term IoT was first coined by Kevin Ashton in 1999 and since then it has come a long way.<\/p>\n<p>A few decades ago people were connected to the outside world in a very limited way which included radios and televisions. Besides, it provided one-way communication experience i.e. one couldn\u2019t talk, interact with it. This slowly changed with the arrival of home computers like the one made by Atari and Commodore in the 1980s and later by the IBM PC. Now users could connect to the outside world but connectivity was still in its infancy. But assisted by\u00a0<a href=\"https:\/\/whatis.techtarget.com\/definition\/Moores-Law\">Moore\u2019s Law<\/a>, technology become available, compact and more affordable every year. This is when security and privacy issues made their way into the user\u2019s consciousness. By late 1990s much had changed, people started using mobiles phones over landlines resulting in more and more compact devices every passing year. The market for online commerce boomed as most people were now connected to the internet. By middle of the 20th century, there were rapid changes and advancement in technology.\u00a0 For instance, the only security concerns of having a watch was it could be physically stolen but nowadays it is about if the watch is disclosing personal information that could enable identity theft or fraud.<\/p>\n<p>The reason IoT is trending is because various IoT products have gained popularity in the market; including smart refrigerators, home thermostats and door locks controlled by smartphones. Let\u2019s take an example of a smart home, a smart home is full of products that understand your preferences, foresee your everyday needs so that you spend less time managing or supervising your house and more time living in it.<\/p>\n<p>&nbsp;<\/p>\n<h3><strong>What are the security challenges in IoT?<\/strong><\/h3>\n<p>IoT is already trending all over the Information Technology Domain. With this popularity it becomes harder to secure IoT System. There are many vectors a developer has to focus on in order to secure the IoT environment such as:<\/p>\n<p>1.Default credentials &amp; Configuration<br \/>\n2.Ensure high availability<br \/>\n3.Secure web, mobile, and cloud applications<br \/>\n4.Secure communication<br \/>\n5.Authorize and authenticate devices<br \/>\n6.Security Patches<br \/>\n7.Detect vulnerabilities and incidents<br \/>\n8.Manage vulnerabilities<\/p>\n<p>IoT Security is being taken even more seriously due to the past Cryto Mining and DDoS attacks like Mirai Botnet, Stuxnet, Cold in Finland, Brickerbot, Botnet Barrage, etc<\/p>\n<p>Mirai Botnet:<br \/>\nMirai (Japanese for &#8220;the future&#8221;) is a self-propagating botnet virus which infects poorly protected Internet connected devices by using telnet service to find devices using factory default username and password. The effectiveness of Mirai is due to its ability to reach other insecure devices and co-ordinate with them to perform DDoS attack against the target. Mirai was used, along with BASHLITE, in the DDoS attack on 20 September 2016 on the \u201cKrebs on Security\u201d site which reached 620 Gbit\/s. \u201cArs Technica\u201d also reported a 1 Tbit\/s attack on French web host.<\/p>\n<p>&nbsp;<\/p>\n<h3><strong>How to address security issues in IoT environment? <\/strong><\/h3>\n<p>IoT Penetration testing is not widely followed because IoT development itself is not yet entirely evolved. In the field of IT many organizations from small-scale to large-scale MNCs are developing IoT related products without expertise and security awareness.<\/p>\n<p>IoT Pentesting should be conducted on all products in UAT environment before deploying it in production. Upon mapping the attacking surface of IoT, we can categorize it as follows:<\/p>\n<p><strong>Hardware Hacking<\/strong><\/p>\n<p>Hardware hacking consists of analysing internal architecture of the device including internal components to determine attacking surface, firmware extraction, identification of test points, reconfiguring the device\u2019s hardware to bypass authentication and intercept traffic.<\/p>\n<p><strong>Network Testing<\/strong><\/p>\n<p>Network testing consists of identifying security flaws in the services running on a network or in a cloud server. An attacker can gain access to sensitive information and with readily available exploits, she\/he can successfully compromise servers and further compromising entire IoT infrastructure.<\/p>\n<p><strong>Software Hacking<\/strong><\/p>\n<p>Software hacking consists of penetration testing of Web Application and Mobile Application.<\/p>\n<p><strong>Communication Protocol<\/strong><\/p>\n<p>IoT devices often use non-standard communication protocols (MQTT, CoAP) and radio waves (BLE, Zigbee) which can be tested for cryptographic security, ability to sniff traffic and modify it from an attacker\u2019s perspective.<\/p>\n<p>&nbsp;<\/p>\n<h3><strong>What are the common security concerns missed out by developers?<\/strong><\/h3>\n<p>With the growth of new and advanced frameworks for IoT development, developers don&#8217;t really need to think about configurations of servers, devices, encryption,etc which makes it efficient and faster to develop an IoT product within given limited time frame. With all these advantages come few of the security flaws which every developer needs to keep in mind before deploying an IoT product. Most common security mistakes which developers make while developing IoT products are:<\/p>\n<p><strong>Default Credentials<\/strong><\/p>\n<p>Most of the IoT devices in use have default credentials enabled which can be easily found in the documentation section of the corresponding product.<\/p>\n<p><strong>Storing Sensitive Data<\/strong><\/p>\n<p>Most of the developers might store sensitive data like API Keys, Encryption Keys, FTP Credentials on the devices. (i.e. in mobile devices via Mobile application or IoT devices via firmware.)<\/p>\n<p><strong>Debugging Services Not Disabled<\/strong><\/p>\n<p>On hardware level, developers often debug the hardware in order to find any flaws so as to minimize it. Usually it is conducted with the help of debugging pins like UART, JTAG, Serial, USB, SWD which are not disabled after the deployment of the devices in an IoT infrastructure. Using these debugging ports an attacker can successfully gain root\/shell access to system, dump firmware or flash data from the device and successfully compromise the device.<\/p>\n<p><strong>Missing Patches<\/strong><\/p>\n<p>Upon deploying devices in an IoT Infrastructure, developers often run the devices with the older firmware and operating system without checking it for software updates and security patches regularly. This might leave a loophole for an attacker to compromise the system.<\/p>\n<p><strong>Services with no Encryption<\/strong><\/p>\n<p>Often times developers take extra efforts to make the product efficient, which mostly aggrandize the overall user experience. But due to lack of security awareness a developer might disable many crucial security features like Encryption. As IoT devices need to be low power consuming they are configured to use few protocols without encryption which can lead to theft of credentials. For example, Unencrypted MQTT service might lead an attacker to sniff entire traffic transmitted by IoT devices.<\/p>\n<p>&nbsp;<\/p>\n<h3><strong>What are the best security practices for developers to follow?<\/strong><\/h3>\n<p>Best security practices suggest a developer to avoid exposing any sort of sensitive information on a device, network or application level. It is advised to avoid all common security mistakes to ensure a secure IoT environment.<\/p>\n<p>Here, we are done with the basics of IoT security testing. It basically can be performed by pentester who has proper understanding of IoT architecture and expertise in black box and white box penetration testing.<\/p>\n<p>In further blogs we will discuss all vectors included in IoT Pentesting in detail which would also consist of in-depth impact analysis of most common IoT vulnerabilities. These IoT devices are an integral part of our lives and to secure them you all have got Varutra Consulting to happily assist you in <a href=\"https:\/\/www.varutra.com\/special-security-services\/#internet-of-things-security-services\">IoT Security.<\/a><\/p>\n<p>Author,<\/p>\n<div dir=\"ltr\"><b><span style=\"font-size: small\">Shreeya Patewadiyar<\/span><\/b><\/div>\n<p><em>Attack &amp; PenTest Team<\/em><\/p>\n<p><em>Varutra Consulting<\/em><\/p>","protected":false},"excerpt":{"rendered":"<p>Introduction to Internet of Things (IoT) and IoT Security Challenges Information security, often referred to as InfoSec, is a set of strategies to protect sensitive&#8230;<\/p>\n","protected":false},"author":3,"featured_media":2210,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"inline_featured_image":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[140,286,274],"tags":[145,146,147,149,150,102,151],"aioseo_notices":[],"aioseo_head":"\n\t\t<!-- All in One SEO Pro 4.6.3 - aioseo.com -->\n\t\t<meta name=\"description\" content=\"Internet of Things (IoT) basically includes anything and everything connected to the internet or to each other. Know what is IoT and IoT Security challenges.\" \/>\n\t\t<meta name=\"robots\" content=\"max-image-preview:large\" \/>\n\t\t<link rel=\"canonical\" href=\"https:\/\/www.varutra.com\/varutravrt3\/basics-of-internet-of-things-iot-security-testing\/\" \/>\n\t\t<meta name=\"generator\" content=\"All in One SEO Pro (AIOSEO) 4.6.3\" \/>\n\t\t<meta property=\"og:locale\" content=\"en_US\" \/>\n\t\t<meta property=\"og:site_name\" content=\"Varutra Consulting\" \/>\n\t\t<meta property=\"og:type\" content=\"article\" \/>\n\t\t<meta property=\"og:title\" content=\"Internet of Things (IoT) and IoT Security challenges\" \/>\n\t\t<meta property=\"og:description\" content=\"Internet of Things (IoT) basically includes anything and everything connected to the internet or to each other. Know what is IoT and IoT Security challenges.\" \/>\n\t\t<meta property=\"og:url\" content=\"https:\/\/www.varutra.com\/varutravrt3\/basics-of-internet-of-things-iot-security-testing\/\" \/>\n\t\t<meta property=\"og:image\" content=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2018\/10\/BO650X305.jpg\" \/>\n\t\t<meta property=\"og:image:secure_url\" content=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2018\/10\/BO650X305.jpg\" \/>\n\t\t<meta property=\"og:image:width\" content=\"651\" \/>\n\t\t<meta property=\"og:image:height\" content=\"305\" \/>\n\t\t<meta property=\"article:section\" content=\"Case Study\" \/>\n\t\t<meta property=\"article:tag\" content=\"basics of security testing\" \/>\n\t\t<meta property=\"article:tag\" content=\"internet of things\" \/>\n\t\t<meta property=\"article:tag\" content=\"iot\" \/>\n\t\t<meta property=\"article:tag\" content=\"iot basics\" \/>\n\t\t<meta property=\"article:tag\" content=\"iot security testing\" \/>\n\t\t<meta property=\"article:tag\" content=\"penetration testing\" \/>\n\t\t<meta property=\"article:tag\" content=\"security testing\" \/>\n\t\t<meta property=\"article:published_time\" content=\"2018-10-10T16:11:58+00:00\" \/>\n\t\t<meta property=\"article:modified_time\" content=\"2022-12-02T10:18:11+00:00\" \/>\n\t\t<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n\t\t<meta name=\"twitter:title\" content=\"Internet of Things (IoT) and IoT Security challenges\" \/>\n\t\t<meta name=\"twitter:description\" content=\"Internet of Things (IoT) basically includes anything and everything connected to the internet or to each other. Know what is IoT and IoT Security challenges.\" \/>\n\t\t<meta name=\"twitter:image\" content=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2018\/10\/BO650X305.jpg\" \/>\n\t\t<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t\t<meta name=\"twitter:data1\" content=\"kalpadmin\" \/>\n\t\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n\t\t<script type=\"application\/ld+json\" class=\"aioseo-schema\">\n\t\t\t{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/basics-of-internet-of-things-iot-security-testing\\\/#article\",\"name\":\"Internet of Things (IoT) and IoT Security challenges\",\"headline\":\"Introduction to Internet of Things (IoT)\",\"author\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/author\\\/admin\\\/#author\"},\"publisher\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#organization\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/wp-content\\\/uploads\\\/2018\\\/10\\\/BO650X305.jpg\",\"width\":651,\"height\":305,\"caption\":\"BO650X305\"},\"datePublished\":\"2018-10-10T16:11:58+05:30\",\"dateModified\":\"2022-12-02T15:48:11+05:30\",\"inLanguage\":\"en-US\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/basics-of-internet-of-things-iot-security-testing\\\/#webpage\"},\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/basics-of-internet-of-things-iot-security-testing\\\/#webpage\"},\"articleSection\":\"Case Study, IOT Security, Security Hardening, Basics of security testing, Internet of Things, IoT, IoT Basics, IoT Security Testing, Penetration Testing, Security Testing\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/basics-of-internet-of-things-iot-security-testing\\\/#breadcrumblist\",\"itemListElement\":[{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#listItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/\",\"nextItem\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/basics-of-internet-of-things-iot-security-testing\\\/#listItem\"},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/basics-of-internet-of-things-iot-security-testing\\\/#listItem\",\"position\":2,\"name\":\"Introduction to Internet of Things (IoT)\",\"previousItem\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#listItem\"}]},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#organization\",\"name\":\"Varutra\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/Varutra-Found-e1612984024606.jpg\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/basics-of-internet-of-things-iot-security-testing\\\/#organizationLogo\"},\"image\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/basics-of-internet-of-things-iot-security-testing\\\/#organizationLogo\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/author\\\/admin\\\/#author\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/author\\\/admin\\\/\",\"name\":\"kalpadmin\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/basics-of-internet-of-things-iot-security-testing\\\/#authorImage\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d69b4bf504d3e2e3c6ad0c424e16bcb2?s=96&d=mm&r=g\",\"width\":96,\"height\":96,\"caption\":\"kalpadmin\"}},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/basics-of-internet-of-things-iot-security-testing\\\/#webpage\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/basics-of-internet-of-things-iot-security-testing\\\/\",\"name\":\"Internet of Things (IoT) and IoT Security challenges\",\"description\":\"Internet of Things (IoT) basically includes anything and everything connected to the internet or to each other. Know what is IoT and IoT Security challenges.\",\"inLanguage\":\"en-US\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#website\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/basics-of-internet-of-things-iot-security-testing\\\/#breadcrumblist\"},\"author\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/author\\\/admin\\\/#author\"},\"creator\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/author\\\/admin\\\/#author\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/wp-content\\\/uploads\\\/2018\\\/10\\\/BO650X305.jpg\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/basics-of-internet-of-things-iot-security-testing\\\/#mainImage\",\"width\":651,\"height\":305,\"caption\":\"BO650X305\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/basics-of-internet-of-things-iot-security-testing\\\/#mainImage\"},\"datePublished\":\"2018-10-10T16:11:58+05:30\",\"dateModified\":\"2022-12-02T15:48:11+05:30\"},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#website\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/\",\"name\":\"Varutra Consulting\",\"description\":\"Secure your digital world with our Cybersecurity services.\",\"inLanguage\":\"en-US\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#organization\"}}]}\n\t\t<\/script>\n\t\t<!-- All in One SEO Pro -->\r\n\t\t<title>Internet of Things (IoT) and IoT Security challenges<\/title>\n\n","aioseo_head_json":{"title":"Internet of Things (IoT) and IoT Security challenges","description":"Internet of Things (IoT) basically includes anything and everything connected to the internet or to each other. Know what is IoT and IoT Security challenges.","canonical_url":"https:\/\/www.varutra.com\/varutravrt3\/basics-of-internet-of-things-iot-security-testing\/","robots":"max-image-preview:large","keywords":"","webmasterTools":{"miscellaneous":""},"og:locale":"en_US","og:site_name":"Varutra Consulting","og:type":"article","og:title":"Internet of Things (IoT) and IoT Security challenges","og:description":"Internet of Things (IoT) basically includes anything and everything connected to the internet or to each other. Know what is IoT and IoT Security challenges.","og:url":"https:\/\/www.varutra.com\/varutravrt3\/basics-of-internet-of-things-iot-security-testing\/","og:image":"https:\/\/www.varutra.com\/wp-content\/uploads\/2018\/10\/BO650X305.jpg","og:image:secure_url":"https:\/\/www.varutra.com\/wp-content\/uploads\/2018\/10\/BO650X305.jpg","og:image:width":"651","og:image:height":"305","article:section":"Case Study","article:tag":["basics of security testing","internet of things","iot","iot basics","iot security testing","penetration testing","security testing"],"article:published_time":"2018-10-10T16:11:58+00:00","article:modified_time":"2022-12-02T10:18:11+00:00","twitter:card":"summary_large_image","twitter:title":"Internet of Things (IoT) and IoT Security challenges","twitter:description":"Internet of Things (IoT) basically includes anything and everything connected to the internet or to each other. Know what is IoT and IoT Security challenges.","twitter:image":"https:\/\/www.varutra.com\/wp-content\/uploads\/2018\/10\/BO650X305.jpg","twitter:label1":"Written by","twitter:data1":"kalpadmin","twitter:label2":"Est. reading time","twitter:data2":"9 minutes","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.varutra.com\/varutravrt3\/basics-of-internet-of-things-iot-security-testing\/#article","name":"Internet of Things (IoT) and IoT Security challenges","headline":"Introduction to Internet of Things (IoT)","author":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/author\/admin\/#author"},"publisher":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/#organization"},"image":{"@type":"ImageObject","url":"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2018\/10\/BO650X305.jpg","width":651,"height":305,"caption":"BO650X305"},"datePublished":"2018-10-10T16:11:58+05:30","dateModified":"2022-12-02T15:48:11+05:30","inLanguage":"en-US","mainEntityOfPage":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/basics-of-internet-of-things-iot-security-testing\/#webpage"},"isPartOf":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/basics-of-internet-of-things-iot-security-testing\/#webpage"},"articleSection":"Case Study, IOT Security, Security Hardening, Basics of security testing, Internet of Things, IoT, IoT Basics, IoT Security Testing, Penetration Testing, Security Testing"},{"@type":"BreadcrumbList","@id":"https:\/\/www.varutra.com\/varutravrt3\/basics-of-internet-of-things-iot-security-testing\/#breadcrumblist","itemListElement":[{"@type":"ListItem","@id":"https:\/\/www.varutra.com\/varutravrt3\/#listItem","position":1,"name":"Home","item":"https:\/\/www.varutra.com\/varutravrt3\/","nextItem":"https:\/\/www.varutra.com\/varutravrt3\/basics-of-internet-of-things-iot-security-testing\/#listItem"},{"@type":"ListItem","@id":"https:\/\/www.varutra.com\/varutravrt3\/basics-of-internet-of-things-iot-security-testing\/#listItem","position":2,"name":"Introduction to Internet of Things (IoT)","previousItem":"https:\/\/www.varutra.com\/varutravrt3\/#listItem"}]},{"@type":"Organization","@id":"https:\/\/www.varutra.com\/varutravrt3\/#organization","name":"Varutra","url":"https:\/\/www.varutra.com\/varutravrt3\/","logo":{"@type":"ImageObject","url":"https:\/\/www.varutra.com\/wp-content\/uploads\/2021\/11\/Varutra-Found-e1612984024606.jpg","@id":"https:\/\/www.varutra.com\/varutravrt3\/basics-of-internet-of-things-iot-security-testing\/#organizationLogo"},"image":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/basics-of-internet-of-things-iot-security-testing\/#organizationLogo"}},{"@type":"Person","@id":"https:\/\/www.varutra.com\/varutravrt3\/author\/admin\/#author","url":"https:\/\/www.varutra.com\/varutravrt3\/author\/admin\/","name":"kalpadmin","image":{"@type":"ImageObject","@id":"https:\/\/www.varutra.com\/varutravrt3\/basics-of-internet-of-things-iot-security-testing\/#authorImage","url":"https:\/\/secure.gravatar.com\/avatar\/d69b4bf504d3e2e3c6ad0c424e16bcb2?s=96&d=mm&r=g","width":96,"height":96,"caption":"kalpadmin"}},{"@type":"WebPage","@id":"https:\/\/www.varutra.com\/varutravrt3\/basics-of-internet-of-things-iot-security-testing\/#webpage","url":"https:\/\/www.varutra.com\/varutravrt3\/basics-of-internet-of-things-iot-security-testing\/","name":"Internet of Things (IoT) and IoT Security challenges","description":"Internet of Things (IoT) basically includes anything and everything connected to the internet or to each other. Know what is IoT and IoT Security challenges.","inLanguage":"en-US","isPartOf":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/#website"},"breadcrumb":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/basics-of-internet-of-things-iot-security-testing\/#breadcrumblist"},"author":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/author\/admin\/#author"},"creator":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/author\/admin\/#author"},"image":{"@type":"ImageObject","url":"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2018\/10\/BO650X305.jpg","@id":"https:\/\/www.varutra.com\/varutravrt3\/basics-of-internet-of-things-iot-security-testing\/#mainImage","width":651,"height":305,"caption":"BO650X305"},"primaryImageOfPage":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/basics-of-internet-of-things-iot-security-testing\/#mainImage"},"datePublished":"2018-10-10T16:11:58+05:30","dateModified":"2022-12-02T15:48:11+05:30"},{"@type":"WebSite","@id":"https:\/\/www.varutra.com\/varutravrt3\/#website","url":"https:\/\/www.varutra.com\/varutravrt3\/","name":"Varutra Consulting","description":"Secure your digital world with our Cybersecurity services.","inLanguage":"en-US","publisher":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/#organization"}}]}},"aioseo_meta_data":{"post_id":"2340","title":"Internet of Things (IoT) and IoT Security challenges","description":"Internet of Things (IoT) basically includes anything and everything connected to the internet or to each other. Know what is IoT and IoT Security challenges.","keywords":[],"keyphrases":"{\"focus\":{\"keyphrase\":\"Internet of Things\",\"score\":80,\"analysis\":{\"keyphraseInTitle\":{\"title\":\"Focus keyphrase in SEO title\",\"description\":\"Focus keyphrase found in SEO title.\",\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseInDescription\":{\"title\":\"Focus keyphrase in meta description\",\"description\":\"Focus keyphrase found in meta description.\",\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseLength\":{\"title\":\"Focus keyphrase length\",\"description\":\"Good job!\",\"score\":9,\"maxScore\":9,\"error\":0,\"length\":3},\"keyphraseInURL\":{\"title\":\"Focus keyphrase in URL\",\"description\":\"Focus keyphrase used in the URL.\",\"score\":5,\"maxScore\":5,\"error\":0},\"keyphraseInIntroduction\":{\"title\":\"Focus keyphrase in introduction\",\"description\":\"Your Focus keyphrase appears in the first paragraph. Well done!\",\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseInSubHeadings\":{\"title\":\"Focus keyphrase in Subheadings\",\"description\":\"Use more focus keyphrases in your H2 and H3 subheadings!\",\"score\":3,\"maxScore\":9,\"error\":1},\"keyphraseInImageAlt\":{\"title\":\"Focus keyphrase in image alt attributes\",\"description\":\"Focus keyphrase not found in image alt attribute(s). Add an image with your Focus keyphrase as alt text.\",\"score\":3,\"maxScore\":9,\"error\":1}}},\"additional\":[{\"keyphrase\":\"IoT Security Challenges\",\"score\":67,\"analysis\":{\"keyphraseInDescription\":{\"title\":\"Keyphrase in meta description\",\"description\":\"Keyphrase found in meta description.\",\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseLength\":{\"title\":\"Keyphrase length\",\"description\":\"Good job!\",\"score\":9,\"maxScore\":9,\"error\":0,\"length\":3},\"keyphraseInIntroduction\":{\"title\":\"Keyphrase in introduction\",\"description\":\"Your Keyphrase does not appear in the first paragraph. Make sure the topic is clear immediately.\",\"score\":3,\"maxScore\":9,\"error\":1},\"keyphraseInImageAlt\":{\"title\":\"Keyphrase in image alt attributes\",\"description\":\"Keyphrase not found in image alt attribute(s). Add an image with your Keyphrase as alt text.\",\"score\":3,\"maxScore\":9,\"error\":1}}},{\"keyphrase\":\"IoT Security\",\"score\":67,\"analysis\":{\"keyphraseInDescription\":{\"title\":\"Keyphrase in meta description\",\"description\":\"Keyphrase found in meta description.\",\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseLength\":{\"title\":\"Keyphrase length\",\"description\":\"Good job!\",\"score\":9,\"maxScore\":9,\"error\":0,\"length\":2},\"keyphraseInIntroduction\":{\"title\":\"Keyphrase in introduction\",\"description\":\"Your Keyphrase does not appear in the first paragraph. Make sure the topic is clear immediately.\",\"score\":3,\"maxScore\":9,\"error\":1},\"keyphraseInImageAlt\":{\"title\":\"Keyphrase in image alt attributes\",\"description\":\"Keyphrase not found in image alt attribute(s). Add an image with your Keyphrase as alt text.\",\"score\":3,\"maxScore\":9,\"error\":1}}},{\"keyphrase\":\"IoT\",\"score\":83,\"analysis\":{\"keyphraseInDescription\":{\"title\":\"Keyphrase in meta description\",\"description\":\"Keyphrase found in meta description.\",\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseLength\":{\"title\":\"Keyphrase length\",\"description\":\"Good job!\",\"score\":9,\"maxScore\":9,\"error\":0,\"length\":1},\"keyphraseInIntroduction\":{\"title\":\"Keyphrase in introduction\",\"description\":\"Your Keyphrase appears in the first paragraph. Well done!\",\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseInImageAlt\":{\"title\":\"Keyphrase in image alt attributes\",\"description\":\"Keyphrase not found in image alt attribute(s). Add an image with your Keyphrase as alt text.\",\"score\":3,\"maxScore\":9,\"error\":1}}}]}","primary_term":null,"canonical_url":null,"og_title":null,"og_description":null,"og_object_type":"default","og_image_type":"featured","og_image_url":"https:\/\/www.varutra.com\/wp-content\/uploads\/2018\/10\/BO650X305.jpg","og_image_width":"651","og_image_height":"305","og_image_custom_url":null,"og_image_custom_fields":null,"og_video":"","og_custom_url":null,"og_article_section":"Case Study","og_article_tags":[],"twitter_use_og":true,"twitter_card":"default","twitter_image_type":"default","twitter_image_url":null,"twitter_image_custom_url":null,"twitter_image_custom_fields":null,"twitter_title":null,"twitter_description":null,"schema":{"blockGraphs":[],"customGraphs":[],"default":{"data":{"Article":[],"Course":[],"Dataset":[],"FAQPage":[],"Movie":[],"Person":[],"Product":[],"Recipe":[],"Service":[],"SoftwareApplication":[],"WebPage":[]},"graphName":"","isEnabled":true},"graphs":[]},"schema_type":"default","schema_type_options":"{\"article\":{\"articleType\":\"BlogPosting\"},\"course\":{\"name\":\"\",\"description\":\"\",\"provider\":\"\"},\"faq\":{\"pages\":[]},\"product\":{\"reviews\":[]},\"recipe\":{\"ingredients\":[],\"instructions\":[],\"keywords\":[]},\"software\":{\"reviews\":[],\"operatingSystems\":[]},\"webPage\":{\"webPageType\":\"WebPage\"}}","pillar_content":false,"robots_default":true,"robots_noindex":false,"robots_noarchive":false,"robots_nosnippet":false,"robots_nofollow":false,"robots_noimageindex":false,"robots_noodp":false,"robots_notranslate":false,"robots_max_snippet":"-1","robots_max_videopreview":"-1","robots_max_imagepreview":"large","priority":null,"frequency":"default","local_seo":null,"limit_modified_date":false,"open_ai":null,"created":"2021-10-27 15:16:26","updated":"2022-12-02 10:23:28"},"aioseo_breadcrumb":"<div class=\"aioseo-breadcrumbs\"><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/www.varutra.com\/varutravrt3\" title=\"Home\">Home<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">&raquo;<\/span><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/www.varutra.com\/varutravrt3\/category\/case-study\/\" title=\"Case Study\">Case Study<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">&raquo;<\/span><span class=\"aioseo-breadcrumb\">\n\tIntroduction to Internet of Things (IoT)\n<\/span><\/div>","aioseo_breadcrumb_json":[{"label":"Home","link":"https:\/\/www.varutra.com\/varutravrt3"},{"label":"Case Study","link":"https:\/\/www.varutra.com\/varutravrt3\/category\/case-study\/"},{"label":"Introduction to Internet of Things (IoT)","link":"https:\/\/www.varutra.com\/varutravrt3\/basics-of-internet-of-things-iot-security-testing\/"}],"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/posts\/2340"}],"collection":[{"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/comments?post=2340"}],"version-history":[{"count":5,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/posts\/2340\/revisions"}],"predecessor-version":[{"id":20356,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/posts\/2340\/revisions\/20356"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/media\/2210"}],"wp:attachment":[{"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/media?parent=2340"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/categories?post=2340"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/tags?post=2340"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}