Chapter 3–Flawed, Insecure Devices

Previously, we discussed how networks could be inherently insecure and why this caused major security risks. It didn’t really matter how secure a device was if it was installed within a weak insecure home network. In this chapter, we will move on to discuss flawed and insecure devices that come of the shelf and will be installed in weak or insecure networks, and what we can do about it.

In this chapter, we hope you will understand:

  1. Why so many IoT devices go to market insecure
  2. Why it isn’t always the manufacturers fault
  3. How to understand the IoT device production cycle
  4. Why failure to secure products leads to reputational loss

Why are so many insecure devices on the market?

So, what is holding back the ...

Get IoT Security Issues now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.