A threat actor parks close to the home of a user and uses packet capture software to intercept the home wireless traffic. The threat actor then analyzes the traffic of the temperature sensor of the home to determine if someone is in the house now. Which factor of the smart home security system is affected by this attack?

IT Questions BankCategory: IoT SecurityA threat actor parks close to the home of a user and uses packet capture software to intercept the home wireless traffic. The threat actor then analyzes the traffic of the temperature sensor of the home to determine if someone is in the house now. Which factor of the smart home security system is affected by this attack?

A threat actor parks close to the home of a user and uses packet capture software to intercept the home wireless traffic. The threat actor then analyzes the traffic of the temperature sensor of the home to determine if someone is in the house now. Which factor of the smart home security system is affected by this attack?

  • firmware
  • authentication
  • WPA2
  • encryption

Explanation: In general, the security requirements for a smart home should include the following:

– WPA2 – The wireless network should use the latest Wi-Fi security, which is currently WPA2.
– Encryption – It protects the confidentiality and integrity of information transmitted over a network.
– Authentication – Strong authentication protects the device from unauthorized use or reconfiguration and prevents disclosure or modification of the data stored on the device.
– Firmware – The IoT device manufacturers should update the firmware for any newly discovered vulnerabilities. The home IoT device users should enable the checking of updates automatically.

More Questions: IoT Security 1.1 Chapter 1 Quiz Answers


guest

0 Comments
Inline Feedbacks
View all comments
0
Would love your thoughts, please comment.x