[PDF][PDF] Securing the internet of things: Mapping attack surface areas using the OWASP IoT top 10

D Miessler - wiki.owasp.org
20 network application mobile cloud IoT◆ 10/10 security systems accept '123456'◆ 10/10
security systems with no lockout◆ 10/10 security systems with enumeration◆ SSH listeners …