The concept of Internet of Things (IoT) is based on a layered architecture. Each of the layers includes the application of a range of diverse technologies for the data transmission, processing and storage. This paper will explore the vulnerabilities and threats in IoT environment and protection methods that can be implemented within such an environment due to the hardware limitations of the existing equipment and technology used for data transfer. Based on the results of the research, classification of security risks of the architectures' particular layer, as well as security risks depending on the type of use of IoT concept will be proposed. The classification of risk will provide the opportunity to direct further research on the most vulnerable layers of the architecture and implementation of appropriate methods of protection, depending on the application of this concept. This research was conducted in order to provide accurate information for visually impaired people.