-
Book Overview & Buying
-
Table Of Contents
-
Feedback & Rating
IoT and OT Security Handbook
By :
Risk assessment provides you with a roadmap that will tell you what to protect and how to protect it. The ever-growing number of IoT or OT devices is increasing the security risks of organizations. Since an OT or IoT environment lacks modern controls such as auto-patching or a strong password (no default password), it becomes imperative that MDIoT should be leveraged, as it can instantly discover unknown vulnerabilities.
This understanding of vulnerabilities can be achieved by generating a risk assessment report. Figure 9.1 shows the Risk assessment section in the MDIoT sensor portal. Click the Generate report tab:
Figure 9.1 – Risk assessment in the sensor portal
When you click on a generated report, you will see the downloaded file, as shown in Figure 9.2:
Figure 9.2 – Downloading the risk assessment report
Let us move on to understanding what this report provides. Figure 9.3 depicts the overall security...
Change the font size
Change margin width
Change background colour