Cargando…

Practical internet of things security /

A practical, indispensable security guide that will navigate you through the complexrealm of securely building and deploying systems in our IoT-connected worldAbout This Book*Learn to design and implement cyber security strategies for your organization*Learn to protect cyber-physical systems and uti...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autores principales: Russell, Brian (Autor), Duren, Drew Van (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Birmingham : Packt Publishing, 2016.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 i 4500
001 EBOOKCENTRAL_ocn958945567
003 OCoLC
005 20240329122006.0
006 m o d
007 cr |||||||||||
008 160530s2016 enk o 000 0 eng d
040 |a NLE  |b eng  |e rda  |e pn  |c NLE  |d COO  |d VT2  |d FEM  |d EBLCP  |d OCLCQ  |d MERUC  |d CHVBK  |d OCLCQ  |d UOK  |d OCLCQ  |d WYU  |d OCLCQ  |d LVT  |d OCLCQ  |d UKMGB  |d OCLCO  |d K6U  |d OCLCQ  |d OCLCL 
015 |a GBB682814  |2 bnb 
016 7 |a 017880506  |2 Uk 
019 |a 968065316  |a 969066961 
020 |a 9781785880292  |q (PDF ebook) 
020 |a 1785880292  |q (PDF ebook) 
020 |a 9781785889639 
020 |a 178588963X 
024 3 |a 9781785889639 
029 1 |a CHNEW  |b 000949040 
029 1 |a CHVBK  |b 483152137 
029 1 |a UKMGB  |b 017880506 
035 |a (OCoLC)958945567  |z (OCoLC)968065316  |z (OCoLC)969066961 
037 |a 9781785880292  |b Packt Publishing Pvt. Ltd 
050 4 |a QA76.9.A25  |b R87 2016 
082 0 4 |a 005.8  |2 23 
049 |a UAMI 
100 1 |a Russell, Brian,  |e author. 
245 1 0 |a Practical internet of things security /  |c Brian Russell, Drew Van Duren. 
264 1 |a Birmingham :  |b Packt Publishing,  |c 2016. 
300 |a 1 online resource 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file 
588 0 |a CIP data; resource not viewed. 
520 8 |a A practical, indispensable security guide that will navigate you through the complexrealm of securely building and deploying systems in our IoT-connected worldAbout This Book*Learn to design and implement cyber security strategies for your organization*Learn to protect cyber-physical systems and utilize forensic data analysis to beat vulnerabilities in your IoT ecosystem*Learn best practices to secure your data from device to the cloud*Gain insight into privacy-enhancing techniques and technologiesWho This Book Is ForThis book targets IT Security Professionals and Security Engineers (including pentesters, security architects and ethical hackers) who would like to ensure security of their organization's data when connected through the IoT. Business analysts and managers will also find it useful. What You Will Learn*Learn how to break down cross-industry barriers by adopting the best practices for IoT deployments*Build a rock-solid security program for IoT that is cost-effective and easy to maintain*Demystify complex topics such as cryptography, privacy, and penetration testing to improve your security posture*See how the selection of individual components can affect the security posture of the entire system*Use Systems Security Engineering and Privacy-by-design principles to design a secure IoT ecosystem*Get to know how to leverage the burdgening cloud-based systems that will support the IoT into the future. In DetailWith the advent of Intenret of Things (IoT), businesses will be faced with defending against new types of threats. The business ecosystem now includes cloud computing infrastructure, mobile and fixed endpoints that open up new attack surfaces, a desire to share information with many stakeholders and a need to take action quickly based on large quantities of collected data. . It therefore becomes critical to ensure that cyber security threats are contained to a minimum when implementing new IoT services and solutions. . The interconnectivity of people, devices, and companies raises stakes to a new level as computing and action become even more mobile, everything becomes connected to the cloud, and infrastructure is strained to securely manage the billions of devices that will connect us all to the IoT. This book shows you how to implement cyber-security solutions, IoT design best practices and risk mitigation methodologies to address device and infrastructure threats to IoT solutions. This book will take readers on a journey that begins with understanding the IoT and how it can be applied in various industries, goes on to describe the security challenges associated with the IoT, and then provides a set of guidelines to architect and deploy a secure IoT in your Enterprise. The book will showcase how the IoT is implemented in early-adopting industries and describe how lessons can be learned and shared across diverse industries to support a secure IoT. 
505 0 |a Cover ; Copyright; Credits; About the Authors; About the Reviewer; www.PacktPub.com; Table of Contents; Preface; A Brave New World; Defining the IoT; Cybersecurity versus IoT security and cyber-physical systems; Why cross-industry collaboration is vital; IoT uses today; Energy industry and smart grid; Connected vehicles and transportation; Manufacturing; Wearables; Implantables and medical devices; The IoT in the enterprise; The things in the IoT; The IoT device lifecycle; The hardware; Operating systems; IoT communications; Messaging protocols; Transport protocols; Network protocols. 
505 8 |a Data link and physical protocolsIoT data collection, storage and analytics; IoT integration platforms and solutions; The IoT of the future and the need to secure; The future -- cognitive systems and the IoT; Summary; Vulnerabilities, Attacks, and Countermeasures; Primer on threats, vulnerability, and risks (TVR); The classic pillars of information assurance; Threats; Vulnerability; Risk; Primer on attacks and countermeasures; Common IoT attack types; Attack trees; Building an attack tree; Fault (failure) trees and CPS; Fault tree and attack tree differences. 
505 8 |a Merging fault and attack tree analysisExample anatomy of a deadly cyber-physical attack; Today's IoT attacks; Attacks; Wireless reconnaissance and mapping; Security protocol attacks; Physical security attacks; Application security attacks; Lessons learned and systematic approaches; Threat modeling an IoT system; Step 1 -- identify the assets; Step 2 -- create a system/architecture overview; Step 3 -- decompose the IoT system; Step 4 -- identify threats; Step 5 -- document the threats; Step 6 -- rate the threats; Summary; Security Engineering for IoT Development. 
505 8 |a Building security in to design and developmentSecurity in agile developments; Focusing on the IoT device in operation; Secure design; Safety and security design; Threat modeling; Privacy impact assessment; Safety impact assessment; Compliance; Security system integration; Processes and agreements; Secure acquisition process; Secure update process; Establish SLAs; Establish privacy agreements; Consider new liabilities and guard against risk exposure; Establish an IoT physical security plan; Technology selection -- security products and services; IoT device hardware; Selecting an MCU. 
505 8 |a Selecting a real-time operating system (RTOS)IoT relationship platforms; Cryptographic security APIs; Authentication/authorization; Edge; Security monitoring; Summary; The IoT Security Lifecycle; The secure IoT system implementation lifecycle; Implementation and integration; IoT security CONOPS document; Network and security integration; System security verification and validation (V & V); Security training; Secure configurations; Operations and maintenance; Managing identities, roles, and attributes; Security monitoring; Penetration testing; Compliance monitoring. 
590 |a ProQuest Ebook Central  |b Ebook Central Academic Complete 
650 0 |a Internet of things  |x Security measures. 
650 6 |a Internet des objets  |x Sécurité  |x Mesures. 
655 4 |a Security; Programming; Hardware. 
700 1 |a Duren, Drew Van,  |e author. 
758 |i has work:  |a Practical Internet of Things security (Text)  |1 https://id.oclc.org/worldcat/entity/E39PCYDVD3Hg4wbfB3WYVWhBcd  |4 https://id.oclc.org/worldcat/ontology/hasWork 
856 4 0 |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=4594308  |z Texto completo 
936 |a BATCHLOAD 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL4594308 
994 |a 92  |b IZTAP