Summary

This chapter discussed some of the challenges that IoT system developers face when trying to secure their systems, and detailed a set of secure design goals for IoT systems.

We discussed methods for designing IoT systems to mitigate automated attack risks, securing points of integration, implementing hardware protection measures, and building resilient systems.

In Chapter 5, Operational Security Life Cycle, we will explore a secure operational life cycle for IoT systems.

Get Practical Internet of Things Security - Second Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.