Chapter 16–Threats, Vulnerabilities and Risks
In this chapter we will explore the world of threats, vulnerabilities and the inevitable risks that are encountered in the IoT. We will highlight some known threats and vulnerabilities and where we can source up to date threat intelligence. Additionally, we will consider counter-measures and ways to mitigate risk and ways to secure device, firmware and software. Additionally, we will discuss alternatives to default passwords and possible alternatives.
In this chapter the reader will learn:
- About the threats, vulnerabilities and risks for the IoT
- How to get latest threat intelligence and countermeasure information
- How to secure devices, firmware and software
- Practical counter measures
- Device ...
Get IoT Security Issues now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.