- Practical Internet of Things Security
- Brian Russell Drew Van Duren
- 135字
- 2021-06-10 18:42:26
Vulnerabilities, Attacks, and Countermeasures
This chapter elaborates on attack methods against IoT implementations and deployments, how attacks are organized into attack trees, and how IoT cyber-physical systems complicate the threat landscape. We then rationalize a systematic methodology for incorporating countermeasures to secure the IoT. We will explore both typical and unique vulnerabilities seen within various layers of an IoT technology stack, and describe new ways in which electronic and physical threats interact. We provide a tailored approach to threat modeling to show the reader how to develop and maintain usable threat models in their own organizations.
We will explore vulnerabilities, attacks, and countermeasures, and methods of managing them through the following chapter subsections:
- Primer on threats, vulnerability, and risk
- Primer on attacks and countermeasures
- Today's IoT attacks
- Lessons learned—the use of systematic approaches
- 科技安全:戰略實踐與展望
- SASE原理、架構與實踐
- API安全實戰
- 為你護航:網絡空間安全科普讀本(第2版)
- 計算機病毒分析與防范大全(第3版)
- Mastering Kali Linux for Advanced Penetration Testing
- Kali Linux Wireless Penetration Testing Cookbook
- Building a Home Security System with BeagleBone
- 軟件安全保障體系架構
- 信息技術基礎:提高篇·實驗與習題
- Learning Pentesting for Android Devices
- Developing Applications with Salesforce Chatter
- ATT&CK視角下的紅藍對抗實戰指南
- 2023—2024年中國網絡安全發展藍皮書
- 精通Metasploit滲透測試(第3版)