O'Reilly logo

IoT Security Issues by Alasdair Gilchrist

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 8–Security Requirements for the IoT

In previous chapters, we have discussed IoT, home and network vulnerabilities. In this chapter, we will specifically address some of those threats and how they arise.

In this chapter, we cover:

  1. Why security issues arise
  2. Security and product confidence
  3. Why manufacturing techniques go wrong
  4. Why security overhead is often cut from design
  5. And why cutting security is so detrimental to the end product

Why security issues arise

Building end-to-end security into IoT design is a lofty goal but one manufacturer’s must aim for to ensure an acceptable level of trust in their products. The problem is with IoT is that it is an aggregation of many technologies, which makes the threat map and attack surfaces ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required