官术网_书友最值得收藏!

Summary

This chapter explored development methodologies that can be used to develop IoT products. We discussed the waterfall, Spiral, Agile, and DevOps methodologies, and reviewed ways in which security engineering can be used to define and track security requirements, and build security into the design phase of a product.

We discussed non-functional requirements, including security, safety, and resilience, and touched on the need for software transparency and automation in the verification and validation process. 

In Chapter 4Secure Design of IoT Devices, we will discuss the challenges that IoT system developers face when trying to secure their systems, and a set of secure design goals for IoT systems.

主站蜘蛛池模板: 淮北市| 二连浩特市| 温州市| 平塘县| 博客| 云霄县| 龙南县| 遂宁市| 剑阁县| 合山市| 南岸区| 晴隆县| 宝应县| 长春市| 额敏县| 教育| 永州市| 牡丹江市| 利川市| 怀宁县| 玛纳斯县| 林芝县| 永城市| 洛川县| 郑州市| 玉门市| 五华县| 上林县| 同德县| 盖州市| 佛山市| 龙里县| 新巴尔虎右旗| 东乌珠穆沁旗| 安陆市| 安康市| 乳源| 宝山区| 连平县| 华宁县| 蒙山县|