Source: Baseline Security Recommendations for IoT in the context of Critical Information Infrastructures November 2017

# Threat Group Threat Description Assets Affected Remarks
1 Eavesdropping Interception and Hijacking Replay of messages This attack uses a valid data transmission maliciously by repeatedly sending it or delaying it, in order to manipulate or crash the targeted device. Decision making View
2 Eavesdropping Interception and Hijacking IoT communication protocol hijacking Taking control of an existing communication session between two elements of the network. The intruder is able to sniff sensible information, including passwords. The hijacking can use aggressive techniques like forcing disconnection or denial of service. Decision making View
Records : 2 of 2 | Page : of 1 | Limit