Fig. 1From: IoT cyber risk: a holistic analysis of cyber risk assessment frameworks, risk vectors, and risk ranking processIoT risk categoriesBack to article page