Reader small image

You're reading from  Architectural Patterns and Techniques for Developing IoT Solutions

Product typeBook
Published inSep 2023
PublisherPackt
ISBN-139781803245492
Edition1st Edition
Right arrow
Author (1)
Jasbir Singh Dhaliwal
Jasbir Singh Dhaliwal
author image
Jasbir Singh Dhaliwal

Jasbir Singh Dhaliwal has over 26 years of software development and management experience, including 10 years in delivering complex IoT projects. Currently employed with IBM as a Principal Architect (IoT and cloud) and considered a thought leader with over 31 IoT patents, he has a deep understanding of IoT concepts/architectures and has delivered IoT projects in diverse domains such as consumer goods, smart buildings, healthcare, precision agriculture, automobile, and manufacturing. His extensive experience in both the public cloud and embedded domains gives him a unique edge in conceiving innovative end-to-end IoT solutions. He holds a bachelor's degree in computer science and engineering from Punjab Engineering College, India.
Read more about Jasbir Singh Dhaliwal

Right arrow

IoT security vulnerabilities

In this section, we will list some of the risks/vulnerabilities inherent in IoT deployments:

  • Weak, easily guessable, and hardcoded passwords: This allows malicious/threat actors to gain unauthorized access to IoT data and systems. Similarly, the usage of default configurations is another major reason for IoT systems getting compromised. Oftentimes, the configurations are related to the features that are not used in the solution (e.g., unused TCP/UDP ports or serial ports). Using encryption keys and hash algorithms with inadequate cryptographic strength is another vulnerability that is often exploited by threat actors.
  • Vulnerabilities related to connectivity services: Sometimes, the implementation of connectivity services is done without considering security measures (such as data encryption and secure connectivity protocols), resulting in a vulnerability that can be intercepted by threat actors to gain unauthorized access to information such...
lock icon
The rest of the page is locked
Previous PageNext Page
You have been reading a chapter from
Architectural Patterns and Techniques for Developing IoT Solutions
Published in: Sep 2023Publisher: PacktISBN-13: 9781803245492

Author (1)

author image
Jasbir Singh Dhaliwal

Jasbir Singh Dhaliwal has over 26 years of software development and management experience, including 10 years in delivering complex IoT projects. Currently employed with IBM as a Principal Architect (IoT and cloud) and considered a thought leader with over 31 IoT patents, he has a deep understanding of IoT concepts/architectures and has delivered IoT projects in diverse domains such as consumer goods, smart buildings, healthcare, precision agriculture, automobile, and manufacturing. His extensive experience in both the public cloud and embedded domains gives him a unique edge in conceiving innovative end-to-end IoT solutions. He holds a bachelor's degree in computer science and engineering from Punjab Engineering College, India.
Read more about Jasbir Singh Dhaliwal