官术网_书友最值得收藏!

Primer on attacks and countermeasures

Now that we have briefly visited threats, vulnerabilities, and risk, let's dive into greater detail on the types and compositions of attacks present in the IoT and how they can be put together to perform attack campaigns. In this section, we will also introduce attack trees (and fault trees) to help readers visualize and communicate how real-world attacks can happen. It is also our hope that they gain wider adoption and use in broader threat modeling activities, not unlike the threat model example later in this chapter.

主站蜘蛛池模板: 罗田县| 本溪市| 朔州市| 玉环县| 临颍县| 德州市| 招远市| 青岛市| 昌乐县| 平陆县| 建平县| 大兴区| 丽江市| 仪陇县| 三门峡市| 巫溪县| 天门市| 鸡西市| 郁南县| 新昌县| 金昌市| 信宜市| 赤城县| 犍为县| 汾西县| 龙州县| 邯郸市| 上高县| 永川市| 垦利县| 信阳市| 禄丰县| 雷波县| 金秀| 朝阳市| 休宁县| 天台县| 和平区| 普定县| 九龙县| 安陆市|