官术网_书友最值得收藏!

Vulnerabilities, Attacks, and Countermeasures

This chapter elaborates on attack methods against IoT implementations and deployments, how attacks are organized into attack trees, and how IoT cyber-physical systems complicate the threat landscape. We then rationalize a systematic methodology for incorporating countermeasures to secure the IoT. We will explore both typical and unique vulnerabilities seen within various layers of an IoT technology stack, and describe new ways in which electronic and physical threats interact. We provide a tailored approach to threat modeling to show the reader how to develop and maintain usable threat models in their own organizations.

We will explore vulnerabilities, attacks, and countermeasures, and methods of managing them through the following chapter subsections:

  • Primer on threats, vulnerability, and risk
  • Primer on attacks and countermeasures
  • Today's IoT attacks
  • Lessons learned—the use of systematic approaches
主站蜘蛛池模板: 四平市| 道孚县| 兖州市| 凤山市| 柳林县| 平度市| 云和县| 卫辉市| 新密市| 稻城县| 宁海县| 塔河县| 鹿泉市| 玛沁县| 正阳县| 泰州市| 河曲县| 巴塘县| 石楼县| 普安县| 尉氏县| 镇宁| 玛多县| 太康县| 吴忠市| 汉寿县| 华池县| 松溪县| 康马县| 湘阴县| 景东| 德化县| 双流县| 玛曲县| 芮城县| 柘荣县| 长垣县| 中方县| 砚山县| 白银市| 新巴尔虎左旗|