Summary
This chapter provided insights into why security is important in IoT solutions and how the implementation of security measures is different in IoT compared with general IT solutions. Also, it is prudent to leverage the existing knowledge base of generic IT security and tailor/enhance that to suit the needs of IoT security. Some IoT vulnerabilities that were exploited by threat actors in the recent past were also discussed to give a perspective of how vulnerabilities differ in IT vis-à-vis the IoT space.
One key takeaway from this chapter is that there is no single solution that can be used to mitigate IoT security risks and a combination of technical, operational, and organizational measures can help in mitigating potential vulnerabilities. IoT security can be best accomplished if the mitigation strategies use a combination of both the defense in-depth (analyze possible risks and their mitigations at all layers of the IoT stack) and defense in-breadth (consider multiple...