IoT Dev + Test 2017 - Security Testing
Wednesday, April 26
Security Testing Mobile Applications
The sensitive nature of personal information stored on smart devices makes security testing vital when building mobile applications. Alan Crouch explores the unique characteristics of mobile devices—how they store data, the fluid trust boundaries between applications, and the unique aspects of device security models. Learn about the many different threat types and use cases that make security testing mobile applications so challenging. Alan offers hints and tips for comprehensive security testing of mobile applications during the development process, sharing when and where in that process...
Thursday, April 27
A New Approach to IoT Safety, Risk, and Vulnerability Analysis
The ugly truth is that the interconnection of devices with IoT systems can lead to failures which result in physical injury, unacceptable risk, or cybersecurity vulnerabilities. Preventing such accidents requires identifying hazards, risks, and security vulnerabilities during development. Traditional hazard analysis techniques—failure modes and effects analysis, fault tree analysis, and root cause analysis—were developed for simple hardware controllers and are based on single-point failures. However, software fails differently than hardware. Most accidents, system failures, and many cyber...
Friday, April 28
The IoT: Internet of Threats?
PreviewFrom connected elevators to smart cars, the Internet of Things (IoT) is all around us, even in ways we're not aware of. The devices make our lives easier, encourage us to exercise, and save time and resources--but at what cost? With current computer and mobile technology, the main threat is to our data and our accounts, with phishing and ransomware topping the charts; however, the IoT introduces risk to our personal safety and compromises our privacy in ways we can't even yet imagine. Join Chris to...
Building and Testing Secure Mobile Apps
Mobile application development is now a mission-critical component of IT organizations and a big part of the software industry’s landscape. Due to the security threats associated with mobile devices, it is critical we build our apps—from the ground up—to be secure and trustworthy. However, many application developers and testers do not understand how to build and test secure mobile applications. Alan Crouch discusses the risks associated with mobile platforms/applications and describes proven practices for ensuring the safety of your mobile applications. Alan delves into the unique nuances...