- Practical Internet of Things Security
- Brian Russell Drew Van Duren
- 294字
- 2021-06-10 18:42:27
Threats
It is important to distinguish between a threat and threat source (or threat actor). Each threat has a threat actor. For example, in the case of a burglar invading your home, it is tempting to consider the burglar as the actual threat, but it is more accurate and useful to consider them the threat source (or actor). They are the actor, who may attack your house for a variety of malicious purposes, most notably their self-serving desire to separate you from your valued assets. In this context, the threat is actually the potential for the burglary to be performed, or more generally represents the exploit potential.
Threats may therefore come in a variety of types, both natural and man-made. Tornados, floods, and hurricanes can be considered natural threats; in these cases, the Earth's weather serves as the threat actor (or acts of God, in the lingo of many insurance policies).
IoT threats include all of the information assurance threats to management, application, sensor and control data sent to and from IoT devices. In addition, IoT devices are subject to the same physical security, hardware, software quality, environmental, supply chain, and many other threats, common to both security and safety domains. IoT devices in CPS (for example, actuation, and physical sensing) are subject to physical reliability and resilience threats beyond just the compromise or degradation of the computing platform. Additional engineering disciplines are at play in many industrial IoT CPS, such as classical control theory, state estimation and control, and others that use sensors, sensor feedback, controllers, filters, and actuators to manipulate physical system states. Threats can also target control system transfer functions, state estimation filters (such as Kalman filters), and other inner control loop artifacts that have direct consequences for the physical world.
- 工業(yè)互聯(lián)網(wǎng)安全防護(hù)與展望
- Rootkit和Bootkit:現(xiàn)代惡意軟件逆向分析和下一代威脅
- 計(jì)算機(jī)病毒分析與防范大全(第3版)
- 工業(yè)物聯(lián)網(wǎng)安全
- 諸神之眼:Nmap網(wǎng)絡(luò)安全審計(jì)技術(shù)揭秘
- 網(wǎng)絡(luò)安全技術(shù)與實(shí)訓(xùn)(第4版)(微課版)
- 網(wǎng)絡(luò)運(yùn)維親歷記 (網(wǎng)絡(luò)運(yùn)維紀(jì)實(shí)文學(xué))
- 網(wǎng)絡(luò)安全能力成熟度模型:原理與實(shí)踐
- Kerberos域網(wǎng)絡(luò)安全從入門到精通
- 電腦安全與攻防入門很輕松(實(shí)戰(zhàn)超值版)
- 黑客攻防從入門到精通
- 網(wǎng)絡(luò)空間安全導(dǎo)論
- Hands-On Artificial Intelligence for Cybersecurity
- Learn Azure Sentinel
- 安全網(wǎng)絡(luò)構(gòu)建