This article discusses the components of IoT security and provides an overview of common IoT attacks like eavesdropping, privilege escalation, and brute force. It also covers the working mechanisms of these attacks and prevention technologies like personal firewalls, intrusion detection systems, and strong password policies. Real-life examples of successful attacks are also discussed.