This article discusses the Internet of Things (IoT), including its analysis, techniques and means of protection, the potential of employing edge computing to reduce traffic transmission, the decentralisation of decision-making systems, and information security. There was intensive research into the ways in which IoT systems are attacked, and safeguarding suggestions were developed as a result.