Market Research Logo

IoT Best Practices: A Threat Model for Technology Risk Management

IoT Best Practices: A Threat Model for Technology Risk Management

This IDC study provides a process for developing a threat model for IoT architectures to properly identify the attack vectors that an intelligent adversary may use to compromise or disrupt IoT solutions. "Threat modeling is the unsung hero of a risk assessment process," said Pete Lindstrom, vice president of Security Strategies. "It is especially crucial to address the risk associated with the many components and proliferation of IoT solutions."


IDC Opinion
In This Study
Situation Overview
Evaluating Control Objectives
Constructing a Threat Model
Assessing the Risk
Future Outlook
Hardware: IoT Modules
Hardware: Servers and Storage
Connectivity/Service Enablement
Software: Platforms
Software: Analytics/Social Business
Applications and Vertical Use Cases
Essential Guidance
Learn More
Related Research
Synopsis

Download our eBook: How to Succeed Using Market Research

Learn how to effectively navigate the market research process to help guide your organization on the journey to success.

Download eBook

Share this report