- Practical Internet of Things Security
- Brian Russell Drew Van Duren
- 251字
- 2021-06-10 18:42:31
Step 2 – create a system/architecture overview
This step provides a solid foundation for understanding not only the expected functionality of the IoT system, but also the potential misuse of the system. There are three sub-steps to this part of the threat modeling process:
- Start with documenting expected functionality.
- Create an architectural diagram that details the new IoT system. During this process, trust boundaries in the architecture should be established. Trust boundaries should elucidate the trust between actors and their directionality.
- Identify technologies used within the IoT system.
Documentation of system functionality is best accomplished by creating a set of use cases such as those that follow:

An architectural diagram of the system details the components of the system, their interactions, and the protocols employed in their interactions. The following is an architectural diagram of our example smart parking solution:
Once the logical architecture view is complete, it is important to identify and examine the specific technologies that will comprise the IoT system. This includes understanding and documenting lower-level details regarding the endpoint devices, such as the processor types and operating systems.
The endpoint details provide the information needed to understand the specific types of potential vulnerabilities that may eventually be exposed and define processes for patch management and firmware updates. Understanding and documenting the protocols that are used by each IoT device will also allow for updates to the architecture, especially if gaps are found in the cryptographic controls applied to the data transmitted throughout the system and the organization:

- 云原生安全:攻防實踐與體系構(gòu)建
- Learning Python for Forensics
- 大型互聯(lián)網(wǎng)企業(yè)安全架構(gòu)
- 暗戰(zhàn)亮劍:黑客滲透與防御全程實錄
- 電子支付的規(guī)制結(jié)構(gòu)配置研究
- Preventing Digital Extortion
- 代碼審計:企業(yè)級Web代碼安全架構(gòu)
- 網(wǎng)絡(luò)安全技術(shù)及應(yīng)用(第3版)
- 模糊測試:強制發(fā)掘安全漏洞的利器
- 隱私計算
- 先進云安全研究與實踐
- 網(wǎng)絡(luò)安全態(tài)勢感知
- 數(shù)字政府網(wǎng)絡(luò)安全合規(guī)性建設(shè)指南:密碼應(yīng)用與數(shù)據(jù)安全
- 信息系統(tǒng)安全等級化保護原理與實踐
- 計算機系統(tǒng)與網(wǎng)絡(luò)安全研究