Introduction to IoT Hacking

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
or

Already have an account? Sign In »

Time
7 hours 6 minutes
Difficulty
Intermediate
CEU/CPE
7
Video Transcription
00:00
Hey, everyone, welcome back to the course in this video. We're gonna take a brief introduction to I o T. Hacking. So we'll talk about the i o T. Architecture as well as some of the components of I o. T.
00:11
So the architecture involves application layer, middleware, layer Internet layer, the access gateway layer as well as the edge technology layer. So let's talk about each one of those a little bit.
00:21
So we've got our application layer. This one lives at the top of the stack, so it's responsible for the delivery of services
00:27
thio the users from different sectors. So could be things like industrial manufacturing. Automobile healthcare s a wearable devices, your pacemakers, defibrillators, etcetera.
00:39
We next to have the middleware layer. This one sits in between the hardware and application layers. Eso it acts as an interface between those two layers.
00:47
It does things like data management. Device management handles various other things like data analysis, aggregation of the data data filtering
00:56
device, information, discovery, even access control.
01:00
We have the internet layer next that one is basically the communication between the end point. So it could be a device to device could be device to cloud device to the gateway on even back and data sharing.
01:11
We next have our access gateway layer. So this one helps bridge the gap between two endpoints. So think of device and Client in that example,
01:19
this is where the first data handling actually takes place. And it carries out things like the message routing and message identification.
01:27
And finally, we have the edge technology layer. So this one consists of the actual hardware parts. So this is our hardware layer. So things like our sensors R f i D tags or radio frequency identifying tags if you don't know what that is.
01:41
And the anti technology layer basically is focused on data collection. So collecting data from all those different devices.
01:48
So what are R I o t components while we have the sensing technology. So these are the sensors that are actually embedded in the device is on. They grab a variety of information, right? It could be things like the temperature. Any gasses or gas amounts in the area could grab information like the location
02:05
could also be data around a patient, right? It could be a defibrillator or pacemaker that reading of patients heart rhythm and determining, for example, with the defibrillator determining. Should I shock the patient back into a normal heart heart rhythm? Or should I leave them alone? Right? Um, not getting to healthcare wise. But I was a former nurse,
02:24
and I did work in cardiology and electrophysiology, which is what the
02:28
pacemakers defibrillators stuff. Is Onda a patient going into ventricular defibrillation? We want that defibrillator to shock them right to shock them back into a normal heart rhythm. But a patient that's in atrial fibrillation or something like that. We may not be that concerned with it, because that's an upper chamber of the heart of the lower chamber
02:46
and again, without getting too
02:47
nursing or medical stuff. In this course, just understand that there's a variety of data points, depending on the use of the I. O. T. Device,
03:00
we next to have R i. O T gateways. So these were used to bridge the gap between the OT device, which we would kind of consider that internal network and the end user, which we would consider that external network
03:09
eso that that just allows them to communicate with each other. Hence the name Gateway right
03:15
next we have a cloud server or data storage. So this is where we have collected all of that data. It's traveled through the gateway, and now it's in this magical place called The Cloud
03:24
On. Then it's stored there and undergoes data analysis. And that's where we kind of chop it up and disseminated toe where it needs to go for it to be valuable to the organization.
03:35
And then finally, the remote control using a mobile app. So this is where the end user uses remote controls. So, for example, using a mobile phone a tablet, um, could be even a lapse laptop. And basically they're using that device to monitor control, retrieve data from those various devices out there.
03:54
So just a quick, quick question here. This layer of the I o T. Architecture carries out the communication between two endpoints so thinking through things like device to cloud, Which one is that? Is that access gateway layer, the middleware layer or the Internet layer?
04:09
Alright. If you guessed Internet layer, you are correct.
04:12
So in this video, we just talked about the I o T. Architecture. We also talked about different components of i O. T.
Up Next
Penetration Testing and Ethical Hacking

The Penetration Testing and Ethical Hacking course prepares students for industry penetration testing certifications, like CEH. This course walks students through the process of gaining intelligence, scanning and enumerating and hacking the target.

Instructed By