Summary

The cloud, the fog, and the IoT will continue to converge as time progresses and technologies mature, leaving system architects with a wide range of choices as to where to place intelligence, data storage, management, and security features within an IoT system. 

In this chapter, we discussed the cloud and the fog, threats to a cloud-enabled IoT system, and CSP IoT security offerings.

In Chapter 11, IoT Incident Response and Forensic Analysis, we'll explore incident management and forensics for the IoT.

Get Practical Internet of Things Security - Second Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.