This chapter provided guidance on building, maintaining, and executing an incident response plan, including the challenges and methods of IoT forensics. We defined IoT incident response and management and discussed the unique details related to executing IoT incident response activities.
Furthermore, this chapter established analytical aspects of IoT devices, as well as usage of IoT data in forensic activities.
The safe and secure implementation of IoT systems is a difficult challenge to undertake, given the unique characteristics of these systems, their ability to impact events in the physical world, and the diverse nature of IoT implementations. This book has attempted to provide practical advice for designing and deploying many types of complex IoT systems.
We hope that you are able to tailor this guidance to your own unique environments, even as the pace of change...