- Practical Internet of Things Security
- Brian Russell Drew Van Duren
- 95字
- 2021-06-10 18:42:27
Primer on threats, vulnerability, and risks
A substantial amount of academic wrangling has evolved competing definitions for the concepts of threats, vulnerability, and risks. In the interest of keeping this volume practical and usable, we first revisit in this section what the information assurance industry has termed the five pillars of information assurance. These pillars, or domains, of information assurance represent the highest-level categories of assurance in an information system. Next, we will introduce two additional pillars that are critically important in cyber-physical systems. Once introduced, we then explore IoT threats, vulnerabilities, and risks.
推薦閱讀
- Rootkit和Bootkit:現代惡意軟件逆向分析和下一代威脅
- 可信計算3.0工程初步(第二版)
- 安全防御入門手冊
- 編譯與反編譯技術實戰
- 持續集成:軟件質量改進和風險降低之道
- 聯邦學習原理與算法
- Instant OSSEC Host-based Intrusion Detection System
- 動態賦能網絡空間防御
- Metasploit 5.0 for Beginners
- 反黑風暴:黑客社會工程學攻防演練
- 網絡安全應急響應基礎理論及關鍵技術
- INSTANT Penetration Testing:Setting Up a Test Lab How-to
- 業務安全關鍵技術與應用實踐
- 信息安全風險評估手冊(第2版)
- 商用密碼權威指南:技術詳解、產品開發與工程實踐