CHAPTER 8

Mobile Communications and the IoT

In this chapter you will

•  Describe mobile platform attacks

•  Identify Mobile Device Management

•  Identify mobile platforms vulnerabilities and attack vectors

•  Identify IoT security threats and attacks

•  List IoT security and hacking tools

•  List IoT hacking methodology

•  Identify OT security threats and attacks

I’m certain you’ve seen The Matrix series of movies. In short, the movies postulate that we’re not actually alive, breathing and interacting with each other—we’re actually all just jacked into a huge computer program simulating everything we perceive as real. There’s a big temptation here for me to launch into perception versus reality, dimensional variations and destiny versus free ...

Get CEH Certified Ethical Hacker All-in-One Exam Guide, Fifth Edition, 5th Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.