IOT

Product Security

Nowadays, Internet is everywhere. For instance, if you take a look around you will realize that more devices than you were expecting are connected to the net: your phone, laptop, fridge, heating.

The process of securing an IoT involves different centers of expertise and many sub-activities such as:

01

Hardware Penetration Test

Analysis of the security level of a hardware.

02

Code Review

Analysis of the security level of a software.

03

Reverse Engineering

Analysis of the product designs, architecture and code.

04

Communication Analysis

Analysis of the communication between the device and the network

05

Web Application Penetration Test

Analysis of the product web portals

06

Network Penetration Test

Analysis of the product hosts