官术网_书友最值得收藏!

Vulnerabilities, Attacks, and Countermeasures

This chapter elaborates on attack methods against IoT implementations and deployments, how attacks are organized into attack trees, and how IoT cyber-physical systems complicate the threat landscape. We then rationalize a systematic methodology for incorporating countermeasures to secure the IoT. We will explore both typical and unique vulnerabilities seen within various layers of an IoT technology stack, and describe new ways in which electronic and physical threats interact. We provide a tailored approach to threat modeling to show the reader how to develop and maintain usable threat models in their own organizations.

We will explore vulnerabilities, attacks, and countermeasures, and methods of managing them through the following chapter subsections:

  • Primer on threats, vulnerability, and risk
  • Primer on attacks and countermeasures
  • Today's IoT attacks
  • Lessons learned—the use of systematic approaches
主站蜘蛛池模板: 万州区| 龙泉市| 景洪市| 建昌县| 景东| 永年县| 江陵县| 邹城市| 东光县| 沈丘县| 平舆县| 桐梓县| 三都| 张家界市| 芦溪县| 嘉义市| 武平县| 滨海县| 社会| 中超| 凤山县| 交城县| 平泉县| 娱乐| 尖扎县| 黄山市| 伊川县| 莆田市| 通辽市| 深水埗区| 湘潭市| 西充县| 达日县| 茌平县| 大同市| 镇沅| 黄龙县| 屏东县| 宁明县| 德阳市| 龙岩市|