In part 1 of this series, we covered why Distributed Internet of Things (IoT) devices are attractive and vulnerable targets for cybercriminals and hackers. By their nature, they are relatively easy to compromise and are often connected to networks with high-value content. Moreover, distributed IoT devices rarely have direct user interaction, so many types of device compromise are likely to go unnoticed and undetected.
Now we turn our attention to strategies for protecting these devices, which in turn, helps to protect your entire network. Protecting a distributed IoT device involves reducing the device’s attack surface by eliminating or hardening points of attack, especially for three areas of vulnerability where compromises can result in class breaks: