Practical internet of things security /
A practical, indispensable security guide that will navigate you through the complexrealm of securely building and deploying systems in our IoT-connected worldAbout This Book*Learn to design and implement cyber security strategies for your organization*Learn to protect cyber-physical systems and uti...
Clasificación: | Libro Electrónico |
---|---|
Autores principales: | , |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Birmingham :
Packt Publishing,
2016.
|
Temas: | |
Acceso en línea: | Texto completo |
Tabla de Contenidos:
- Cover ; Copyright; Credits; About the Authors; About the Reviewer; www.PacktPub.com; Table of Contents; Preface; A Brave New World; Defining the IoT; Cybersecurity versus IoT security and cyber-physical systems; Why cross-industry collaboration is vital; IoT uses today; Energy industry and smart grid; Connected vehicles and transportation; Manufacturing; Wearables; Implantables and medical devices; The IoT in the enterprise; The things in the IoT; The IoT device lifecycle; The hardware; Operating systems; IoT communications; Messaging protocols; Transport protocols; Network protocols.
- Data link and physical protocolsIoT data collection, storage and analytics; IoT integration platforms and solutions; The IoT of the future and the need to secure; The future
- cognitive systems and the IoT; Summary; Vulnerabilities, Attacks, and Countermeasures; Primer on threats, vulnerability, and risks (TVR); The classic pillars of information assurance; Threats; Vulnerability; Risk; Primer on attacks and countermeasures; Common IoT attack types; Attack trees; Building an attack tree; Fault (failure) trees and CPS; Fault tree and attack tree differences.
- Merging fault and attack tree analysisExample anatomy of a deadly cyber-physical attack; Today's IoT attacks; Attacks; Wireless reconnaissance and mapping; Security protocol attacks; Physical security attacks; Application security attacks; Lessons learned and systematic approaches; Threat modeling an IoT system; Step 1
- identify the assets; Step 2
- create a system/architecture overview; Step 3
- decompose the IoT system; Step 4
- identify threats; Step 5
- document the threats; Step 6
- rate the threats; Summary; Security Engineering for IoT Development.
- Building security in to design and developmentSecurity in agile developments; Focusing on the IoT device in operation; Secure design; Safety and security design; Threat modeling; Privacy impact assessment; Safety impact assessment; Compliance; Security system integration; Processes and agreements; Secure acquisition process; Secure update process; Establish SLAs; Establish privacy agreements; Consider new liabilities and guard against risk exposure; Establish an IoT physical security plan; Technology selection
- security products and services; IoT device hardware; Selecting an MCU.
- Selecting a real-time operating system (RTOS)IoT relationship platforms; Cryptographic security APIs; Authentication/authorization; Edge; Security monitoring; Summary; The IoT Security Lifecycle; The secure IoT system implementation lifecycle; Implementation and integration; IoT security CONOPS document; Network and security integration; System security verification and validation (V & V); Security training; Secure configurations; Operations and maintenance; Managing identities, roles, and attributes; Security monitoring; Penetration testing; Compliance monitoring.