O'Reilly logo

IoT Security Issues by Alasdair Gilchrist

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 16–Threats, Vulnerabilities and Risks

In this chapter we will explore the world of threats, vulnerabilities and the inevitable risks that are encountered in the IoT. We will highlight some known threats and vulnerabilities and where we can source up to date threat intelligence. Additionally, we will consider counter-measures and ways to mitigate risk and ways to secure device, firmware and software. Additionally, we will discuss alternatives to default passwords and possible alternatives.

In this chapter the reader will learn:

  1. About the threats, vulnerabilities and risks for the IoT
  2. How to get latest threat intelligence and countermeasure information
  3. How to secure devices, firmware and software
  4. Practical counter measures
  5. Device ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required