Internet of Things Exploitation
The term IoT was crafted by Kevin Ashton from the media center at the Massachusetts Institute of Technology. It describes a network of physical devices including cameras, vehicles, and sensors. The IoT is exponentially adopted and it represents undeniable promises and possibilities. This rapid adoption opened the doors for new business opportunities, but on the other hand, revealed new threats and weaknesses from a security perspective. This chapter will be your savior. Thus, it will take you from understanding the IoT ecosystem, to knowing how to defend against the real-world IoT attacks. In fact, in this chapter, you will gain the required skills to be ready to secure IoT projects, after learning how to exploit ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Read now
Unlock full access