www.globalcyberalliance.org Open in urlscan Pro
192.124.249.103  Public Scan

Submitted URL: https://t.sidekickopen21.com/Ctc/WZ%2023284/csVV404/Jll2-6q7W7Y8-PT6lZ3m9N7gLqyMWMJf3MgK_1k4Vy5PW3ZpMtr6xlDCFW2vdVyM31mtQHW8Q...
Effective URL: https://www.globalcyberalliance.org/reports_publications/iot-policy-and-attack-report/
Submission: On June 16 via api from TR — Scanned from DE

Form analysis 0 forms found in the DOM

Text Content

For screen-reader mode - click the first button of the websiteAccessibility
Screen-Reader Guide, Feedback, and Issue Reporting

This website stores cookies on your computer. These cookies are used to collect
information about how you interact with our website and allow us to remember
you. We use this information in order to improve and customize your browsing
experience and for analytics and metrics about our visitors both on this website
and other media. To find out more about the cookies we use, see our Privacy
Policy.

If you decline, some website functionality will be affected, but your
information won’t be tracked when you visit this website. A single cookie will
be used in your browser to remember your preference not to be tracked.

Accept Decline
 * Facebook
 * Twitter
 * LinkedIn
 * Youtube
 * Github
 * Mail
 * Community Forum

Select
Languageالعربية简体中文NederlandsEnglishFrançaisहिन्दीItaliano日本語한국어PortuguêsРусскийSlovenčinaEspañol

 * Who We Are
   
   
   WHO WE ARE
   
    * * The Global Cyber Alliance has a singular purpose: to reduce cyber risk.
        Learn about our goals, our impact, and meet the minds behind our
        mission.
    * * Our Mission
      * Our Vision
      * Our Impact
    * * Founding Organizations
      * Our History
      * Team
    * * Partners
      * Careers

 * Programs
   
   
   PROGRAMS
   
    * * At GCA, our core programs – Internet Integrity and Capacity & Resilience
        – aim to tackle key challenges of interent infrastructure, privacy, and
        safety.
    * * Internet Integrity
        * Domain Trust
        * AIDE
    * * Capacity & Resilience
        * GCA Toolkits
        * Accessible Cybersecurity Tools

 * Tools
   
   
   TOOLS
   
    * * We create free, useful tools that make a real impact on improving
        security for organizations and individuals. Explore our tools here.
    * * GCA Cybersecurity Toolkit for Small Business
      * GCA Cybersecurity Toolkit for Journalists
      * GCA Cybersecurity Toolkit for Mission-Based Organizations
      * GCA Cybersecurity Toolkit for Individuals
    * * Quad9
      * DMARC
      * GCA Cybersecurity Toolkit for Elections
      * Cyber Hygiene for Financial Institutions

 * Get Involved
   
   
   GET INVOLVED
   
    * * There are many ways that you can become part of our global effort.
        Whether it’s using one of our tools to help improve your own
        cybersecurity, partnering with us on cutting edge projects, or investing
        resources, your involvement is what makes our success possible!
    * * Use a Tool
      * Become a Partner
    * * Community Forum
      * Donate

 * News & Events
   
   
   NEWS & EVENTS
   
    * * Explore the latest news from across the GCA community, find upcoming
        webinars and local events, and dive deeper into resource content.
    * * News
      * Events
    * * Blog
      * Reports & Publications

 * Donate


Menu

Select
Languageالعربية简体中文NederlandsEnglishFrançaisहिन्दीItaliano日本語한국어PortuguêsРусскийSlovenčinaEspañol

 * Donate

 * Who We Are
   
   
   WHO WE ARE
   
    * * The Global Cyber Alliance has a singular purpose: to reduce cyber risk.
        Learn about our goals, our impact, and meet the minds behind our
        mission.
    * * Our Mission
      * Our Vision
      * Our Impact
    * * Founding Organizations
      * Our History
      * Team
    * * Partners
      * Careers

 * Programs
   
   
   PROGRAMS
   
    * * At GCA, our core programs – Internet Integrity and Capacity & Resilience
        – aim to tackle key challenges of interent infrastructure, privacy, and
        safety.
    * * Internet Integrity
        * Domain Trust
        * AIDE
    * * Capacity & Resilience
        * GCA Toolkits
        * Accessible Cybersecurity Tools

 * Tools
   
   
   TOOLS
   
    * * We create free, useful tools that make a real impact on improving
        security for organizations and individuals. Explore our tools here.
    * * GCA Cybersecurity Toolkit for Small Business
      * GCA Cybersecurity Toolkit for Journalists
      * GCA Cybersecurity Toolkit for Mission-Based Organizations
      * GCA Cybersecurity Toolkit for Individuals
    * * Quad9
      * DMARC
      * GCA Cybersecurity Toolkit for Elections
      * Cyber Hygiene for Financial Institutions

 * Get Involved
   
   
   GET INVOLVED
   
    * * There are many ways that you can become part of our global effort.
        Whether it’s using one of our tools to help improve your own
        cybersecurity, partnering with us on cutting edge projects, or investing
        resources, your involvement is what makes our success possible!
    * * Use a Tool
      * Become a Partner
    * * Community Forum
      * Donate

 * News & Events
   
   
   NEWS & EVENTS
   
    * * Explore the latest news from across the GCA community, find upcoming
        webinars and local events, and dive deeper into resource content.
    * * News
      * Events
    * * Blog
      * Reports & Publications

 * Facebook
 * Twitter
 * LinkedIn
 * Youtube
 * Github
 * Mail
 * Community Forum


IOT POLICY AND ATTACK REPORT


GCA INTERNET INTEGRITY PAPERS, ISSUE I


IOT POLICY AND ATTACK REPORT

This is the first issue of the GCA Internet Integrity Papers series, which shows
the results of an IoT Policy and Attack research project conducted jointly by
the Global Cyber Alliance (GCA) and Microsoft.

Based on data about real IoT attacks extracted from GCA’s AIDE platform and
ProxyPot infrastructure, the project aims at providing factual evidence on the
validity of the most widespread policies, recommendations, and standards on IoT
security around the globe.

The result of the research strongly suggests that policymakers are correct in
emphasizing secured access when turning standards into policy. Strong passwords,
vulnerability disclosure policies, and efficient patching should be guiding
principles of any baseline strategy for IoT protection.

The key findings of the report can be summarized as follows:

 * The ETSI principles of “no default passwords,” “implement a vulnerability
   disclosure policy,” and “keep software updated” operate as a golden rule for
   IoT security
 * Secured access and strong passwords go hand in hand
 * Telnet is as a perfect gateway for IoT attacks (use SSH instead); Mirai is,
   by far, the largest source of Telnet-based attacks
 * AIDE and ProxyPot work as reliable testing tools to validate IoT policies,
   standards, and recommendations

Download the Report
Use a Tool Donate Partner with Us

New York  |  London  |  Brussels




 * Facebook
 * Twitter
 * LinkedIn
 * Youtube
 * Github
 * Mail
 * Community Forum

New York  |  London  |  Brussels

The Global Cyber Alliance is a nonprofit organization dedicated to making the
Internet a safer place by reducing cyber risk. We build programs, tools, and
partnerships to sustain a trustworthy Internet to enable social and economic
progress for all. GCA is a 501(c)(3) in the U.S. and a nonprofit in the U.K. and
Belgium.


 * Contact
 * Privacy Policy
 * Donate


 * Terms of Service
 * Intellectual Independence Policy
 * Diversity & Inclusion Statement

info@globalcyberalliance.org     |     +1.646.677.5535





Global Cyber Alliance is a 501(c)(3) Nonprofit Organization



Copyright 2023 Global Cyber Alliance | Sitemap

Scroll to top