9. IoT Security Challenges
Billions of IoT devices create vast attack surfaces. This mind map covers the unique vulnerabilities of connected devices and critical infrastructure (OT/ICS) environments.
Topics Covered
- Default credentials and weak authentication
- Firmware vulnerability management and secure update mechanisms
- Network exposure and lack of segmentation
- Mirai botnet: IoT DDoS attack case study
- OT/ICS/SCADA security: PLCs, historians, HMIs
- Physical security of embedded devices
- ETSI EN 303 645: IoT security baseline standard
- Device lifecycle: procurement through decommissioning
