PublisherThe University of Arizona.
RightsCopyright © is held by the author. Digital access to this material is made possible by the University Libraries, University of Arizona. Further transmission, reproduction or presentation (such as public display or performance) of protected items is prohibited except with permission of the author.
AbstractThe thesis focuses on the components inside the device, vulnerabilities, and interaction with the IoT device, Amazon's Echo Plus. The security of the device is addressed to help users understand how the device operates and what precautions should be in place. Many known vulnerabilities have affected the device along with the steps taken to secure the device. The interaction with the device discusses the steps taken to set up the device and the possible red flags found during this process. Also looked at is how the device can connect users near and far along with the possibility of surprise connections with friends and unknown connections where voice conversations are heard. The final piece is analyzing the packet capture of the device during three different scenarios; the device in isolation, the device in the main room with interaction happening around the device, and finally the user interacting with the device.
Degree ProgramCyber Operations