In this chapter we will explore the world of threats, vulnerabilities and the inevitable risks that are encountered in the IoT. We will highlight some known threats and vulnerabilities and where we can source up to date threat intelligence. Additionally, we will consider counter-measures and ways to mitigate risk and ways to secure device, firmware and software. Additionally, we will discuss alternatives to default passwords and possible alternatives.
In this chapter the reader will learn: