Establishing Principles for Internet of Things Security Part 4

Tags: , |

Is it necessary to restrict access to or control of the device? In part four of the blog series on principles for IoT security, we look at general requirements in order to help prevent unauthorised access or control. If an attacker gains control of the device they may be able to access sensitive data,