官术网_书友最值得收藏!

Part 5 – Threat and security in IoT

We conclude the book with a survey of IoT compromises and attacks. In many cases, IoT systems will not be secured in a home, or in a company. They will be in the public, in very remote areas, in moving vehicles, or even inside a person. The IoT represents the single biggest attack surface for any type of cyber attack. We have seen countless academic hacks, well-organized cyber assaults, and even nation-state security breaches with IoT devices being the target. This chapter will detail several aspects of such breaches and types of remediation any architect must consider to make a consumer or enterprise IoT deployment a good citizen of the internet. We explore the proposed Congressional Act to secure the IoT, and understand the motivation and impact of such government mandate.  

The chapter will checklist the typical security provisions needed for IoT, or any network component. Details of new technologies such as blockchains and Software Defined Perimeters will also be explored to provide insight into future technologies that will be needed to secure the IoT.

主站蜘蛛池模板: 伊金霍洛旗| 逊克县| 吉林市| 凌云县| 巫溪县| 慈利县| 河南省| 辉南县| 韩城市| 南安市| 翼城县| 基隆市| 防城港市| 湖北省| 巴林左旗| 朝阳市| 邢台市| 武平县| 孟津县| 岢岚县| 仪陇县| 杭锦后旗| 杨浦区| 宜春市| 自治县| 通渭县| 吉木萨尔县| 长沙市| 陆川县| 靖西县| 龙州县| 安岳县| 黄平县| 毕节市| 鹤峰县| 高要市| 固镇县| 芜湖市| 陆川县| 崇明县| 丰镇市|