In this chapter, you've been introduced to some of the risks involved in creating solutions for the Internet of Things. The goal has not been to dissuade you from doing so, but to prepare you, so that you know how to protect your solutions from common forms of attack. You've learned why security for the IoT is so important, how vulnerable smart societies are, and how design choices affect the security of your solutions. You've also been given an overview of some common forms of attacks and how to protect your systems from common vulnerabilities. In the next chapter, we will discuss privacy and how it affects the Internet of Things.