2 Threat Modeling
The threat modeling process systematically identifies possible attacks against a device and then prioritizes certain issues based on their severity. Because threat modeling can be tedious, it’s sometimes overlooked. Nonetheless, it’s vital to understanding threats, their impact, and the appropriate mitigations you’ll have to take to eliminate them.
In this chapter, we walk you through a simple framework for threat modeling and discuss a few alternative frameworks. Then we briefly describe some of the most important threats that an IoT infrastructure usually encounters so you can successfully employ threat modeling techniques ...
Get Practical IoT Hacking now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.