We conclude the book with a survey of IoT compromises and attacks. In many cases, IoT systems will not be secured in a home, or in a company. They will be in the public, in very remote areas, in moving vehicles, or even inside a person. The IoT represents the single biggest attack surface for any type of cyber attack. We have seen countless academic hacks, well-organized cyber assaults, and even nation-state security breaches with IoT devices being the target. This chapter will detail several aspects of such breaches and types of remediation any architect must consider to make a consumer or enterprise IoT deployment a good citizen of the internet. We explore the proposed Congressional Act to secure the IoT, and understand the motivation and impact of such government mandate.
The chapter will checklist the typical...