This chapter explored IoT vulnerabilities, attacks, and countermeasures by illustrating how an organization can practically define, characterize, and model an IoT system's threat posture. With a thorough understanding of the security (and in some cases, safety) risks, appropriate security architectural development can commence so that appropriate mitigations are developed and deployed to systems and devices throughout the enterprise.
In Chapter 3, Approaches to Secure Development, we will discuss the IoT security life cycle.