Security quality will be paramount to many IoT device users. Since IoT devices will be everywhere, smart and connected, they have become the target for malicious users (i.e., hackers). There is no single set of answers or attacks to ensure adequate security quality. This chapter details the techniques on how a team should assess IoT device resilience vs. security threats. The security techniques are defined as test attacks and designs that expand on the information found in Chapters ...
13. IoT Software Security Test Attacks and Designs
Get IoT System Testing: An IoT Journey from Devices to Analytics and the Edge now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.