- Practical Internet of Things Security
- Brian Russell Drew Van Duren
- 224字
- 2021-06-10 18:42:31
Step 3 – decompose the IoT system
At this stage, the focus is on understanding the life cycle of data as it flows through the system. This understanding allows us to identify vulnerable or weak points that must be addressed within the security architecture. To start, you must identify and document the entry points for data within the system. These points are typically sensors, gateways, or control and management computing resources.
Next, it is important to trace the flow of data from the entry points and document the various components that interact with that data throughout the system. Identify high-profile targets for attackers (these can be intermediate or top-level nodes of an attack tree)—these may be points within the system that aggregate or store data, or they may be high-value sensors that require significant protection to maintain the overall integrity of the system. At the end of this activity, a detailed understanding of the IoT system's attack surface (in terms of data sensitivity and system movements) emerges:
Once data flows have been thoroughly examined, you can begin to catalogue the various physical entry points into the system and the intermediate and internal gateways through which data flows. Also, identify trust boundaries. The entry points and trust boundaries have an enormous security bearing as you identify overall threats associated with the system:

- 云原生安全:攻防實(shí)踐與體系構(gòu)建
- CTF實(shí)戰(zhàn):技術(shù)、解題與進(jìn)階
- 為你護(hù)航:網(wǎng)絡(luò)空間安全科普讀本(第2版)
- 等級(jí)保護(hù)測(cè)評(píng)理論及應(yīng)用
- 計(jì)算機(jī)病毒原理與防范(第2版)
- 網(wǎng)絡(luò)安全技術(shù)及應(yīng)用(第3版)
- Building a Home Security System with BeagleBone
- 網(wǎng)絡(luò)關(guān)鍵設(shè)備安全檢測(cè)實(shí)施指南
- 信息安全工程與實(shí)踐
- 網(wǎng)絡(luò)攻防實(shí)戰(zhàn)研究:MySQL數(shù)據(jù)庫安全
- 黑客攻防入門
- 安全網(wǎng)絡(luò)構(gòu)建
- Hands-On Bug Hunting for Penetration Testers
- 計(jì)算機(jī)病毒揭秘與對(duì)抗
- 網(wǎng)絡(luò)安全與維護(hù)