© Morey J. Haber and Brad Hibbert 2018
Morey J. Haber and Brad HibbertPrivileged Attack Vectorshttps://doi.org/10.1007/978-1-4842-3048-0_14

14. Internet of Things (IoT)

Morey J. Haber and Brad Hibbert2
(1)
Heathrow, Florida, USA
(2)
Carp, Ontario, Canada
 
The Internet of Things (IoT) introduces a unique set of threats based on privileges and attack vectors for a threat actor. By definition, they are single-purpose devices with embedded operating systems to perform a specific function. They possess a few required traits including the capability to be networked and provide a designated function. This includes everything from network-based cameras, digital video recorders, to digital personal assistants. These devices can be categorized for commercial ...

Get Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.