官术网_书友最值得收藏!

Step 3 – decompose the IoT system

At this stage, the focus is on understanding the life cycle of data as it flows through the system. This understanding allows us to identify vulnerable or weak points that must be addressed within the security architecture. To start, you must identify and document the entry points for data within the system. These points are typically sensors, gateways, or control and management computing resources.

Next, it is important to trace the flow of data from the entry points and document the various components that interact with that data throughout the system. Identify high-profile targets for attackers (these can be intermediate or top-level nodes of an attack tree)—these may be points within the system that aggregate or store data, or they may be high-value sensors that require significant protection to maintain the overall integrity of the system. At the end of this activity, a detailed understanding of the IoT system's attack surface (in terms of data sensitivity and system movements) emerges:

Once data flows have been thoroughly examined, you can begin to catalogue the various physical entry points into the system and the intermediate and internal gateways through which data flows. Also, identify trust boundaries. The entry points and trust boundaries have an enormous security bearing as you identify overall threats associated with the system:

主站蜘蛛池模板: 莫力| 佛教| 甘肃省| 梅州市| 忻州市| 景德镇市| 兴和县| 赣榆县| 友谊县| 涪陵区| 大荔县| 泰兴市| 玉溪市| 顺平县| 商丘市| 环江| 罗田县| 昌江| 青铜峡市| 融水| 宜昌市| 府谷县| 邹城市| 宜川县| 盐山县| 桦南县| 小金县| 芦溪县| 娱乐| 大同市| 沁阳市| 平谷区| 交口县| 虹口区| 乌兰察布市| 郁南县| 珠海市| 桂阳县| 本溪市| 德昌县| 泸西县|