00:00

Security Vulnerabilities in Raspberry Pi Devices and Mitigation Strategies

Raspberry Pi devices are versatile but susceptible to security vulnerabilities. Mitigation strategies include changing default passwords, using firewalls like UFW, keeping the OS updated, employing USBGuard, implementing secure SSH connections, and adding two-factor authentication. Stay vigilant with these strategies to enhance the security of your Raspberry Pi setup.

moujane
Download Presentation

Security Vulnerabilities in Raspberry Pi Devices and Mitigation Strategies

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. POTENTIAL SECURITY VULNERABILITIES IN RASPBERRY PI DEVICES WITH MITIGATION STRATEGIES By Briana L. Tolleson

  2. Raspberry Pi is a unique device where you can run Linux, program using Python, play games, run a media center, etc. • It was developed in the United Kingdom in 2006. Eben Upton was the computer scientist working on this project along with Rob Mullins, Jack Lang and Alan Mycroft. •

  3. CVE VULNERABILITIES

  4. SECURITY MITIGATION STRATEGIES • Change the default password immediately when logged into LXTerminal. • Using UFW to have a Firewall. • Keeping the operating system up to date. • Using USBGuard software to prevent rogue USB devices. • Using Key Authentication to keep the Raspberry Pi’s SSH connection secure. • Adding two-factor authentication to SSH.

  5. WORKS CITED • Gargiullo, Mike. “Why the Latest Raspberry Pi CVE Is (Almost) Completely Bogus.” Pivot Point Security, 16 Mar. 2023, www.pivotpointsecurity.com/why-the-latest-raspberry-pi-cve-is-almost-completely-bogus/. • DevicePlus Editorial. “The History of Raspberry Pi.” The History of Raspberry Pi, 13 Jan. 2023, www.deviceplus.com/raspberry-pi/the-history-of-raspberry-pi/#:~:text=coding%20and%20programming.- ,Raspberry%20Pi%20origin%20story,Jack%20Lang%20and%20Alan%20Mycroft. • “CVE-2018-18068: Raspberry Pi 3 Module B+ ARM-Based Hardware Debugging ...” RASPBERRY PI 3 MODULE B+ ARM-BASED HARDWARE DEBUGGING ACCESS CONTROL, vuldb.com/?id.132972. Accessed 1 Dec. 2023. • “National Vulnerability Database.” Nvd.Nist.Gov, 4 Apr. 2019, nvd.nist.gov/vuln/detail/CVE-2018-18068. • “National Vulnerability Database.” nvd.nist.gov, 11 Aug. 2021, nvd.nist.gov/vuln/detail/CVE-2021-38545. • Paganini, Pierluigi. “Glowworm Attack Allows Sound Recovery via Device’s Power Indicator Led.” Security Affairs, 15 Aug. 2021, securityaffairs.com/121158/hacking/glowworm-attack-spy-conversations.html. • Emmet. “Set up UFW on Your Raspberry Pi.” Pi My Life Up, 29 Jan. 2022, pimylifeup.com/raspberry-pi-ufw/. • Emmet. “Setup Antivirus Software on Your Raspberry Pi.” Pi My Life Up, 29 Jan. 2022, pimylifeup.com/raspberry-pi- clamav/#:~:text=ClamAV%20is%20a%20popular%20free,malware%2C%20and%20other%20malicious%20threats. • Arreaga, Nestor X., et al. “Security Vulnerability Analysis for IOT Devices Raspberry Pi Using Pentest.” Procedia Computer Science, Elsevier, 10 Oct. 2023, www.sciencedirect.com/science/article/pii/S1877050923010785#abs0001.

More Related