D2.2 Methodology, tools, and results of testing security and privacy risks of connected devices [1]

Published:

Methodology and tools for the evaluation of security and privacy risks of IoT devices. Catalog of vulnerabilities in IoT devices frequently used by children and young people, including the human factors affecting such vulnerabilities if any (T2.3). The exploitation of such vulnerabilities in new CaaS models (T2.4). Recommendations for risk mitigation. Catalog of vulnerabilities in IoT devices frequently used by children and young people. Recommendations for risk mitigation.