1.5 Explain the threats and vulnerabilities associated with specialised technology

  • Mobile: malware; unpatched devices; jailbreaking; data leaks; OS vulnerabilities

  • IoT: weak passwords; insecure services; lack of security update; outdated component use; insecure data transfer/storage; lack of secure/physical device management

  • Embedded: programming errors; web vulnerability; weak access control/authentication

  • RTOS: RCE; DoS; information leak; improper access control

  • SoC: low-level hardware bugs (boot header modification; partition header table parsing)

  • FPGA: fault injection; hardware trojans; design leaks; foundry fabrication

  • Physical access control: insufficient access control; lack of training; unattended assets

  • Building automation systems: hardcoded secret; BOF; XSS; path traversal; auth bypass

  • Vehicles and drones:

    • CAN bus: DoS; unauthorized remote access

  • Workflow and process automation systems: 3rd party platform vulnerabilities; IAM issue

  • ICS: improper credentials management; weak firewall rules; network design weaknesses

  • SCADA:

    • Modbus: plaintext transmission; no authentication; command injection; weak sessions

Last updated