Cargando…

Understanding Cyber-risks in IoT : When Smart Things Turn Against You.

As much as companies have increased their awareness about cybersecurity, not all of them are taking effective measures to protect themselves and their customers. Many "smart" things or "IoT" devices get connected every year, allowing the creation of more efficient and even new pr...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Andaros, Carolina
Formato: Electrónico eBook
Idioma:Inglés
Publicado: New York : Business Expert Press, 2019.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000Mi 4500
001 EBOOKCENTRAL_on1103220922
003 OCoLC
005 20240329122006.0
006 m o d
007 cr cnu---unuuu
008 190608s2019 nyu o 000 0 eng d
040 |a EBLCP  |b eng  |e pn  |c EBLCP  |d N$T  |d MERUC  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCL 
020 |a 194897665X 
020 |a 9781948976657  |q (electronic bk.) 
029 1 |a AU@  |b 000065929653 
029 1 |a CHNEW  |b 001059035 
029 1 |a CHVBK  |b 569756383 
035 |a (OCoLC)1103220922 
050 4 |a TK5105.8857 
072 7 |a COM  |x 053000  |2 bisacsh 
072 7 |a COM  |x 043050  |2 bisacsh 
072 7 |a COM  |x 060040  |2 bisacsh 
082 0 4 |a 005.8  |2 23 
049 |a UAMI 
100 1 |a Andaros, Carolina. 
245 1 0 |a Understanding Cyber-risks in IoT :  |b When Smart Things Turn Against You. 
260 |a New York :  |b Business Expert Press,  |c 2019. 
300 |a 1 online resource (141 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
588 0 |a Print version record. 
505 0 |a Cover; Understanding Cyberrisks in IoT: When Smart Things Turn Against You; Copyright; Contents; Acknowledgments; Chapter 1: Introduction-What Is IoT?; Chapter 2: Real Attack Cases-It Is Not Science Fiction, Smart Things Can Turn against You; Chapter 3: Vulnerability Assessments and Hacking Experiments-The Risk Is There, Just Waiting for a Hacker with Enough Motivation; Chapter 4: Why Is IoT Especially Vulnerable? Requirements and Challenges.; Chapter 5: IoT in an Office Environment-Printers, Smart TVs, Routers, and Uninvited Guests 
505 8 |a Chapter 6: IoT in an Industrial Environment-Industrial Control Systems and Industry 4.0Chapter 7: IoT in Utilities and Service Monitoring-Smart Meters and Other Stuff; Chapter 8: Typical Types of Attacks Targeting IoT Systems-Understanding What Can Go Wrong; Chapter 9: Lessons Learned-Getting a Better Idea about How to Handle the Risks; Chapter 10: Conclusions-Now What Do I Do with This Information?; References; About the Author; Index; Ad Page; Back Cover 
520 3 |a As much as companies have increased their awareness about cybersecurity, not all of them are taking effective measures to protect themselves and their customers. Many "smart" things or "IoT" devices get connected every year, allowing the creation of more efficient and even new products and services. However, this also brings new risks, considering also that these type of systems present additional challenges for applying cyber- security measures. This often leaves many doors open to malicious hackers! This book explains different ways how these systems get exposed to cyber-attacks in a friendly language using real cases as examples. Business professionals and nontechnical readers can benefit from this book by learning that cybersecurity is not an IT problem but an organizational prolem. As a leader and decision maker, having an under standing of IoT cyberrisks can help you to improve the preparedness of your organization to prevent and deal with cyberattacks. Overall this book is for everybody that wants to learn a little bit more about how cybersecurity is becoming more relevant in the connected world, both present and future. 
590 |a ProQuest Ebook Central  |b Ebook Central Academic Complete 
650 0 |a Internet of things  |x Security measures. 
650 6 |a Internet des objets  |x Sécurité  |x Mesures. 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a COMPUTERS  |x Networking  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Security  |x Online Safety & Privacy.  |2 bisacsh 
758 |i has work:  |a Understanding cyberrisks in IoT (Work)  |1 https://id.oclc.org/worldcat/entity/E39PCYK4xWBrBQrQgGqYhfcJBd  |4 https://id.oclc.org/worldcat/ontology/hasWork 
776 0 8 |i Print version:  |a Andaros, Carolina.  |t Understanding Cyber-risks in LoT : When Smart Things Turn Against You.  |d New York : Business Expert Press, ©2019  |z 9781948976640 
856 4 0 |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=5780570  |z Texto completo 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL5780570 
938 |a EBSCOhost  |b EBSC  |n 2145581 
994 |a 92  |b IZTAP