Chapter 2. Planning for IoT Security
Securing the Internet of Things poses new challenges to organizations, but as with any system that needs to be secured, certain practical steps can be leveraged. This chapter outlines key considerations to explore as part of a security strategy for IoT.
The Attack Continuum
Before we examine the security implications and requirements for an IoT system, some important points need to be considered.
The first consideration is that security is clearly not a one-off incident; it is a continuum, with before, during, and after phases (see Figure 2-1) and can occur in any area of the IoT system.