Chapter 8–Security Requirements for the IoT

In previous chapters, we have discussed IoT, home and network vulnerabilities. In this chapter, we will specifically address some of those threats and how they arise.

In this chapter, we cover:

  1. Why security issues arise
  2. Security and product confidence
  3. Why manufacturing techniques go wrong
  4. Why security overhead is often cut from design
  5. And why cutting security is so detrimental to the end product

Why security issues arise

Building end-to-end security into IoT design is a lofty goal but one manufacturer’s must aim for to ensure an acceptable level of trust in their products. The problem is with IoT is that it is an aggregation of many technologies, which makes the threat map and attack surfaces ...

Get IoT Security Issues now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.