Chapter 8

Typical Types of Attacks Targeting IoT Systems—Understanding What Can Go Wrong

Introduction

In this chapter, typical IoT attack mechanisms are explained. I will assume that you have no previous knowledge of cybersecurity and probably neither an information technology and communication (ITC) background. Thus, the concepts are explained in a simple language in order to be understood by a wider audience. Readers who have knowledge about IT, communication networks, electronics, or engineering can still benefit by broadening their knowledge in cybersecurity, and cybersecurity readers will get a better understanding of the particularities of IoT. Nevertheless, I would suggest those who need technical explanations of the attack mechanisms ...

Get Understanding Cyberrisks in IoT now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.