Get Understanding Cyberrisks in IoT now with O’Reilly online learning.
O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.
Chapter 1 Introduction—What Is IoT?
Chapter 2 Real Attack Cases—It Is Not Science Fiction, Smart Things Can Turn against You
Chapter 3 Vulnerability Assessments and Hacking Experiments—The Risk Is There, Just Waiting for a Hacker with Enough Motivation
Chapter 4 Why Is IoT Especially Vulnerable? Requirements and Challenges
Chapter 5 IoT in an Office Environment—Printers, Smart TVs, Routers, and Uninvited Guests
Chapter 6 IoT in an Industrial Environment—Industrial Control Systems and Industry 4.0
Chapter 7 IoT in Utilities and Service Monitoring—Smart Meters and Other Stuff
Chapter 8 Typical Types of Attacks Targeting IoT Systems—Understanding What Can Go Wrong
Chapter 9 Lessons Learned—Getting ...