官术网_书友最值得收藏!

Step 3 – decompose the IoT system

At this stage, the focus is on understanding the life cycle of data as it flows through the system. This understanding allows us to identify vulnerable or weak points that must be addressed within the security architecture. To start, you must identify and document the entry points for data within the system. These points are typically sensors, gateways, or control and management computing resources.

Next, it is important to trace the flow of data from the entry points and document the various components that interact with that data throughout the system. Identify high-profile targets for attackers (these can be intermediate or top-level nodes of an attack tree)—these may be points within the system that aggregate or store data, or they may be high-value sensors that require significant protection to maintain the overall integrity of the system. At the end of this activity, a detailed understanding of the IoT system's attack surface (in terms of data sensitivity and system movements) emerges:

Once data flows have been thoroughly examined, you can begin to catalogue the various physical entry points into the system and the intermediate and internal gateways through which data flows. Also, identify trust boundaries. The entry points and trust boundaries have an enormous security bearing as you identify overall threats associated with the system:

主站蜘蛛池模板: 伊春市| 贡觉县| 社会| 长寿区| 武威市| 长丰县| 北流市| 石景山区| 寿阳县| 汾西县| 永泰县| 获嘉县| 云浮市| 嘉禾县| 辉南县| 绍兴市| 丰顺县| 丘北县| 太白县| 卢氏县| 连城县| 安溪县| 孟村| 华阴市| 钟祥市| 濮阳县| 镇赉县| 丹棱县| 平度市| 九龙县| 民县| 昌邑市| 大宁县| 夏邑县| 湟源县| 南汇区| 萨迦县| 鄂伦春自治旗| 宝坻区| 云梦县| 新邵县|