O'Reilly logo

IoT Security Issues by Alasdair Gilchrist

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 3–Flawed, Insecure Devices

Previously, we discussed how networks could be inherently insecure and why this caused major security risks. It didn’t really matter how secure a device was if it was installed within a weak insecure home network. In this chapter, we will move on to discuss flawed and insecure devices that come of the shelf and will be installed in weak or insecure networks, and what we can do about it.

In this chapter, we hope you will understand:

  1. Why so many IoT devices go to market insecure
  2. Why it isn’t always the manufacturers fault
  3. How to understand the IoT device production cycle
  4. Why failure to secure products leads to reputational loss

Why are so many insecure devices on the market?

So, what is holding back the ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required