June 2016
Intermediate to advanced
336 pages
9h 15m
English
This chapter explored IoT vulnerabilities, attacks, and countermeasures by illustrating how an organization can practically define, characterize, and model an IoT system's threat posture. With a thorough understanding of the security (and in some cases, safety) risks, appropriate security architectural development can commence such that appropriate mitigations are developed and deployed to systems and devices throughout the enterprise.
In the next chapter, we will discuss the phases of the IoT security lifecycle.