Red Wolf has designed a model that populates known exploits that are found in specific IOT devices at Drexel.
The demand and use of IOT devices within each department of Drexel continues to grow as technology advances. As devices continue to expand, this allows for the advancement of exploits and tools/devices used in attacks. To keep up with the growing demand and the advancement of threats that Drexel faces, Red Wolf has been developed with these concerns in mind. Red Wolf is designed to create a centralized location that queries and populates known exploits attached to specific IOT devices within Drexel. The software and database will store IOT devices at Drexel, the vulnerabilities, and known exploits. Fortunately for Drexel, Red Wolf can be used to help aid and support Drexel’s current innovative initiative program called Bug Bounty. This program encourages users to report bugs and vulnerabilities related to cybersecurity. Red Wolf can provide features that can enhance the overall effectiveness of this current program and update the database to remain current with the times to inform and protect users.