IoT devices will become more pervasive in our lives than mobile phones.
In light of the personal data IoT devices have access to,
understanding the security risk involved becomes critical.
The IoT is an allocation of a 'virtual presence' to a physical object.
Contextual information is being exchanged as this virtuality connect and carry commands as instructed by users.
-> Security features must be built into IoT systems. That, includes rigorous validity checks, authentication, data verification, and data encryption.
-> On the application level, software development must hinge on 'stable' writing code, formative code development standards, rigorous training, threat analysis, and testing.
-> Between systems, the interactions must be governed by an interoperability standard that are both safe and valid.
-> A solid bottom-up structure we will fend off threats to create a secured ecosystem.