IDC Research claims that 90 percent of businesses which are planning to add IoT in their
repertoire are likely to face a hack on their IoT networks.
When an organization is illegally accessed, and its devices are remotely controlled, the
eect on the entire ecosystem can vary greatly. Hence, to ensure that security is fully instilled,
it is compulsory to incorporate cybersecurity measures from the start of a process that is, the
sensors and IoT equipment and adding it in the chain of IoT components ending at the user
interface.
To combat these security doldrums, Microsoft came up with a threat classification model
called STRIDE (Spoofing, Tamper ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month, and much more.