IoT Security Threat and risk RFC 8576
>> YOUR LINK HERE: ___ http://youtube.com/watch?v=CZirEq7Ufjw
Intro to RFC 8576 • What it covers • List of Threats Defined in RFC8576 • 1. What is Vulnerability in code • 2. privacy threat • 3.clonning • 4.malicious substitution • 5.Eavesdropping attack • 6. man in the Middle • 7. Firmware attack • 8. Extraction of Private info • 9. Routing Attack • Sinkhole Attack • Selective forwarding • Warmhole Attack • Sybil Attack • 10. Elevation of Privilege • 11. Denial of Service (DoS) attack • Reference: https://tools.ietf.org/html/rfc8576
#############################
![](http://youtor.org/essay_main.png)