ALIRAN
lisa bock securing the iot: introduction course
   Home   Aliran Monthly    Statements   Human Rights    NGOs   Links   Join Us   About Us
lisa bock securing the iot: introduction course
Book review

Isn’t the grass greener on our side?

Lisa Bock Securing The Iot: Introduction Course May 2026

Organizations that ignore these regulations face not only security breaches but also heavy fines and liability. Lisa Bock’s Securing the IoT: Introduction course delivers a vital message: the convenience of IoT must not outpace its security. The paper has demonstrated that the IoT attack surface is vast, but the solutions are known—strong authentication, encryption, segmentation, and lifecycle management.

| Region | Regulation | Key Requirement | | :--- | :--- | :--- | | | SB-327 | Devices must have unique preprogrammed passwords. | | EU | Cyber Resilience Act | Mandatory security updates for 5+ years; no default passwords. | | UK | PSTI Act | Ban on universal default passwords; vulnerability disclosure policy required. | lisa bock securing the iot: introduction course

Course Reference: Lisa Bock, Securing the IoT: Introduction (LinkedIn Learning) Author of Paper: [Your Name/AI Assistant] Date: April 14, 2026 1. Abstract The Internet of Things (IoT) represents one of the most transformative technological shifts of the 21st century, connecting billions of devices from smart thermostats to industrial sensors. However, this expansive attack surface has introduced unprecedented vulnerabilities. Lisa Bock’s course, Securing the IoT: Introduction , provides a critical foundational framework for understanding these risks. This paper synthesizes the core tenets of the course, exploring the architecture of IoT, the inherent security gaps, threat modeling, and practical mitigation strategies. It concludes that effective IoT security requires a paradigm shift from device-centric thinking to a holistic, lifecycle-based approach encompassing people, processes, and technology. 2. Introduction: The Pervasive Nature of IoT Risk The Internet of Things extends beyond traditional computing endpoints (laptops, servers) to include any physical object with an embedded sensor and network connectivity. While this enables unprecedented data collection and automation, it also introduces the "Drescher Botnet" effect—where insecure refrigerators, cameras, and pacemakers become weaponized. Organizations that ignore these regulations face not only