© Chet Hosmer 2018
Chet HosmerDefending IoT Infrastructures with the Raspberry Pihttps://doi.org/10.1007/978-1-4842-3700-7_1

1. IoT Vulnerabilities

Chet Hosmer1 
(1)
Longs, South Carolina, USA
 

The Internet of Things (IoT) is a network of processing devices with unique identities that can connect to and transfer data over a network without requiring direct human interaction (see Figure 1-1). In many cases this makes the devices themselves autonomous or semiautonomous. They can be controlled, managed, and programmed to follow specific rules of engagement.

The breadth of devices that currently exist as of this writing include the following:
  • Health and Fitness Monitoring

  • Manufacturing Systems

  • Energy Metering

  • Hospital and Patient Care

  • Smart Appliances and Lighting ...

Get Defending IoT Infrastructures with the Raspberry Pi: Monitoring and Detecting Nefarious Behavior in Real Time now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.