This document provides an overview of security issues related to the Internet of Things (IoT). It defines three common IoT reference models - a three-level model, five-level model, and Cisco's seven-level model. It then discusses the scope of IoT applications, potential attackers and their motivations, key security requirements, and vulnerabilities at different levels. The document analyzes potential attacks and countermeasures and identifies two emerging security challenges as the exponential increase in weak links and unexpected use of data. It concludes that IoT will continue to present new threats and attacks against security and privacy that must be addressed.