We conclude the book with a survey of IoT compromises and attacks. In many cases, IoT systems will not be secured in a home, or in a company. They will be in the public, in very remote areas, in moving vehicles, or even inside a person. The IoT represents the single biggest attack surface for any type of cyber attack. We have seen countless academic hacks, well-organized cyber assaults, and even nation-state security breaches with IoT devices being the target. This chapter will detail several aspects of such breaches and types of remediation any architect must consider to make a consumer or enterprise IoT deployment a good citizen of the internet. We explore the proposed Congressional Act to secure the IoT, and understand the motivation and impact of such government mandate. Â
The chapter will checklist the typical...