Summary
This chapter detailed the risks of security in the IoT. With well-known attacks such as Mirai and Stuxnet, which target IoT devices as their intended hosts, architects should design security into an IoT deployment from the start. The IoT makes for the best play space to launch an attack. The systems are usually less security mature than server and PC systems. IoT devices provide the largest attack surface on the planet. Finally, the remoteness of some IoT systems allows for attackers to be physically present and manipulate hardware, which wouldn't happen in a secure office setting. These threats need to be taken seriously, as the ramifications could have a pronounced impact on a device, a city, or a nation.
Further security links of interest are:
- Black hat: https://www.blackhat.com
- Defcon: https://www.defcon.org
- Digital Attack Map: http://www.digitalattackmap.com
- Gattack: http://gattack.io
- IDA Pro Interactive Disassembler: https://www.hex-rays.com
- RSA Conference: https://www.rsaconference...