Cargando…

Practical internet of things security /

A practical, indispensable security guide that will navigate you through the complexrealm of securely building and deploying systems in our IoT-connected worldAbout This Book*Learn to design and implement cyber security strategies for your organization*Learn to protect cyber-physical systems and uti...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autores principales: Russell, Brian (Autor), Duren, Drew Van (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Birmingham : Packt Publishing, 2016.
Temas:
Acceso en línea:Texto completo
Tabla de Contenidos:
  • Cover ; Copyright; Credits; About the Authors; About the Reviewer; www.PacktPub.com; Table of Contents; Preface; A Brave New World; Defining the IoT; Cybersecurity versus IoT security and cyber-physical systems; Why cross-industry collaboration is vital; IoT uses today; Energy industry and smart grid; Connected vehicles and transportation; Manufacturing; Wearables; Implantables and medical devices; The IoT in the enterprise; The things in the IoT; The IoT device lifecycle; The hardware; Operating systems; IoT communications; Messaging protocols; Transport protocols; Network protocols.
  • Data link and physical protocolsIoT data collection, storage and analytics; IoT integration platforms and solutions; The IoT of the future and the need to secure; The future
  • cognitive systems and the IoT; Summary; Vulnerabilities, Attacks, and Countermeasures; Primer on threats, vulnerability, and risks (TVR); The classic pillars of information assurance; Threats; Vulnerability; Risk; Primer on attacks and countermeasures; Common IoT attack types; Attack trees; Building an attack tree; Fault (failure) trees and CPS; Fault tree and attack tree differences.
  • Merging fault and attack tree analysisExample anatomy of a deadly cyber-physical attack; Today's IoT attacks; Attacks; Wireless reconnaissance and mapping; Security protocol attacks; Physical security attacks; Application security attacks; Lessons learned and systematic approaches; Threat modeling an IoT system; Step 1
  • identify the assets; Step 2
  • create a system/architecture overview; Step 3
  • decompose the IoT system; Step 4
  • identify threats; Step 5
  • document the threats; Step 6
  • rate the threats; Summary; Security Engineering for IoT Development.
  • Building security in to design and developmentSecurity in agile developments; Focusing on the IoT device in operation; Secure design; Safety and security design; Threat modeling; Privacy impact assessment; Safety impact assessment; Compliance; Security system integration; Processes and agreements; Secure acquisition process; Secure update process; Establish SLAs; Establish privacy agreements; Consider new liabilities and guard against risk exposure; Establish an IoT physical security plan; Technology selection
  • security products and services; IoT device hardware; Selecting an MCU.
  • Selecting a real-time operating system (RTOS)IoT relationship platforms; Cryptographic security APIs; Authentication/authorization; Edge; Security monitoring; Summary; The IoT Security Lifecycle; The secure IoT system implementation lifecycle; Implementation and integration; IoT security CONOPS document; Network and security integration; System security verification and validation (V & V); Security training; Secure configurations; Operations and maintenance; Managing identities, roles, and attributes; Security monitoring; Penetration testing; Compliance monitoring.