- Practical Internet of Things Security
- Brian Russell Drew Van Duren
- 59字
- 2021-06-10 18:42:31
Step 1 – identify the assets
Documentation of the assets within the system provides an understanding of what must be protected. Assets are items that are of interest to an attacker. For the smart parking solution, we can see typical assets described in in the following table. Note that, for space-saving purposes, we have simplified the asset list somewhat:

推薦閱讀
- 云原生安全:攻防實(shí)踐與體系構(gòu)建
- 數(shù)字身份與元宇宙信任治理
- Kali Linux CTF Blueprints
- Learning Python for Forensics
- 網(wǎng)絡(luò)安全應(yīng)急管理與技術(shù)實(shí)踐
- 電子支付的規(guī)制結(jié)構(gòu)配置研究
- Enterprise Cloud Security and Governance
- Learning Veeam? Backup & Replication for VMware vSphere
- 網(wǎng)絡(luò)安全三十六計(jì):人人該懂的防黑客技巧
- 先進(jìn)云安全研究與實(shí)踐
- Kali Linux高級滲透測試(原書第4版)
- Mastering Malware Analysis
- 物聯(lián)網(wǎng)信息安全技術(shù)
- Web代碼安全漏洞深度剖析
- Web前端黑客技術(shù)揭秘