Understanding IoT Security Risks

Understanding IoT Security Risks

Assessment

Interactive Video

Computers, Science

9th - 12th Grade

Hard

Created by

Lucas Foster

FREE Resource

The video discusses the vulnerabilities of Internet of Things (IoT) devices, highlighting the Mirai botnet attack that disrupted major internet services. It explains how IoT devices, like webcams and smart light bulbs, are susceptible to hacking, leading to privacy breaches and potential physical harm. The video also covers the use of botnets in DDoS attacks and the security flaws in IoT devices due to manufacturers prioritizing cost over security. It suggests solutions like unique passwords, data encryption, and user vigilance to mitigate these risks.

Read more

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What was the primary cause of the 2016 Internet outage?

A natural disaster

A power failure

A software update

A botnet attack

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of devices were primarily involved in the Mirai botnet attack?

Smartphones

IoT devices

Desktop computers

Gaming consoles

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a potential risk of hacking a livestreaming dog monitor?

Loss of internet connection

Exposure of private data

Increased electricity bill

Device overheating

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What can hackers do with compromised IoT devices?

Upgrade their software

Sell them on the black market

Turn them into botnets

Use them as personal computers

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why are IoT devices particularly vulnerable to attacks?

They are expensive

They are not connected to the internet

They are rarely updated

They have strong security

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a common default password set by IoT manufacturers?

123456

password123

admin1234

qwerty

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a suggested solution for improving IoT security?

Increasing device size

Reducing device functionality

Encrypting data

Decreasing device cost

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?