Is a router a better device for an IoT botnet than devices within its network

0 votes

I've read about IoT botnets and how attackers compromise connected devices.

  • Would a compromised router be a better botnet control point than individual IoT devices?
  • Do attackers prefer to target routers since they manage multiple connections?
  • If a router is infected, does it automatically put all IoT devices at risk?

Looking for insights on whether routers or individual IoT devices are more valuable to attackers.

19 hours ago in Cyber Security & Ethical Hacking by Nidhi
• 6,440 points
17 views

No answer to this question. Be the first to respond.

Your answer

Your name to display (optional):
Privacy: Your email address will only be used for sending these notifications.

Related Questions In Cyber Security & Ethical Hacking

0 votes
1 answer

Is CompTIA PenTest+ a better certification than CEH for cybersecurity professionals?

When evaluating certifications for cybersecurity professionals, particularly ...READ MORE

answered Dec 17, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 15,040 points
68 views
0 votes
1 answer

Is using a network sniffer viable for host discovery, or are there better options?

Both network sniffers (e.g., Wireshark) and active ...READ MORE

answered Dec 23, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 15,040 points
66 views
0 votes
0 answers

Do I need a Gateway Firewall for an IoT network?

I’m setting up an IoT network and ...READ MORE

19 hours ago in Cyber Security & Ethical Hacking by Nidhi
• 6,440 points
14 views
0 votes
1 answer
0 votes
2 answers

How to manage network using a router?

Security and data logging.. Simple READ MORE

answered Dec 20, 2020 in Cyber Security & Ethical Hacking by Pavan Billore
3,085 views
+1 vote
1 answer

How do you decrypt a ROT13 encryption on the terminal itself?

Yes, it's possible to decrypt a ROT13 ...READ MORE

answered Oct 17, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 15,040 points
256 views
+1 vote
1 answer

How does the LIMIT clause in SQL queries lead to injection attacks?

The LIMIT clause in SQL can indeed ...READ MORE

answered Oct 17, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 15,040 points
370 views
+1 vote
1 answer

Is it safe to use string concatenation for dynamic SQL queries in Python with psycopg2?

The use of string concatenation while building ...READ MORE

answered Oct 17, 2024 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 15,040 points
220 views
+1 vote
1 answer
webinar REGISTER FOR FREE WEBINAR X
REGISTER NOW
webinar_success Thank you for registering Join Edureka Meetup community for 100+ Free Webinars each month JOIN MEETUP GROUP