Last week, you familiarized yourself with IoT and IoMT. The next step is to select and research the two networked IoT or IoMT devices to use in your memo and search for information about their vulnerabilities.
Project Work: Search Vulnerabilities:
Hospitals, manufacturers, government agencies, and other organizations today rely on networked devices. In addition to medical devices such as insulin pumps, drug delivery systems, and implanted cardiac devices, hospitals use other devices like smart security cameras, trackers for equipment, door locks, and vehicle tracking devices for deliveries and transportation.
Learning Resources
Information security vulnerabilities and exposures are important to understand in order to evaluate and ultimately improve security posture by mitigating risks. The resources below will give you more information on how vulnerabilities and exposures are monitored and communicated within the information security industry.
·
Vulnerabilities and Exposures
·
Common Vulnerabilities and Exposures (CVE) List
☀→ Your task is to check the internet and the
Common Vulnerabilities and Exposures (CVE) List
for networked IoT or IoMT devices with publicly known problems identified in the past six months.
Select two devices related that might be relevant to the organization setting and review what is known about the vulnerabilities of these devices. You will submit your findings in the Vulnerability Memo.
Note: You may contact me if you need to ask me questions, just help me do a very good job and I need to submit this for a very good grade. My email is:
PROSPERPM55@YAHOO.COM
Thanks.
Vulnerability Memo Page 2 of 2
Memo
To: |
Recipient Name |
From: |
Your Name |
Date : |
Date |
Re: |
Subject |
[Brief paragraph introducing the topic of the memo]
Device 1: [device name]
Include:
· 1-2 brief paragraphs of background information about the device
· CVE ID (the number portion of a CVE Entry, for example, “CVE-1999-0067”) and description of the known vulnerability
· Description of possible solutions or resolutions of the vulnerability
· Your recommendation to the hospital including whether the organization should avoid using the product or what alternative solutions should be used.
Device 2: [device name]
Include:
· 1-2 brief paragraphs of background information about the device
· CVE ID (the number portion of a CVE Entry, for example, “CVE-1999-0067”) and description of the known vulnerability
· Description of possible solutions or resolutions of the vulnerability
· Your recommendation to the hospital including whether the organization should avoid using the product or what alternative solutions should be used.