官术网_书友最值得收藏!

Step 4 – identify threats

Within the IoT, there is a clear blending of the physical and electronic worlds. This results in relatively simplistic physical attacks that can be used to thwart a system's functionality. As an example, did the designers of the system include any integrity protections on the position of the cameras that provide data for parking enforcement correlation?

The amount of human involvement in the system also plays a significant factor in the types of attacks that could be used against a system. For example, if human parking enforcement officers aren't involved (that is, the system automatically issues citations for staying over the time limit), then the ability of the system that reads the license plates would have to be thoroughly examined. Could someone spoof a vehicle by simply swapping license plates, or deny the system the ability to read the plate by putting an obscuring layer on top of them?

The popular STRIDE model can be applied to IoT system deployments. Use well-known vulnerability repositories to better understand the environment, such as MITRE's common vulnerability and exposure database. Uncovering the unique threats to any particular IoT instantiation will be guided by the threat types (note that is also a good time to utilize attack/fault tree analysis for some implementations and deployments):

The application of the STRIDE model with the additional components that support the IoT can be seen in the following table:

主站蜘蛛池模板: 大城县| 湖北省| 尖扎县| 射洪县| 乌拉特中旗| 平顺县| 天峻县| 丘北县| 安陆市| 柘荣县| 霸州市| 中阳县| 阳东县| 安国市| 江口县| 方山县| 齐河县| 南乐县| 民乐县| 桐城市| 古交市| 桐梓县| 方山县| 公安县| 横山县| 葫芦岛市| 中宁县| 江山市| 分宜县| 泗水县| 漳州市| 华蓥市| 东平县| 增城市| 天全县| 普定县| 江川县| 剑川县| 城口县| 曲麻莱县| 沅江市|