- Internet of Things for Architects
- Perry Lea
- 187字
- 2021-06-25 22:47:00
Part 5 – Threat and security in IoT
We conclude the book with a survey of IoT compromises and attacks. In many cases, IoT systems will not be secured in a home, or in a company. They will be in the public, in very remote areas, in moving vehicles, or even inside a person. The IoT represents the single biggest attack surface for any type of cyber attack. We have seen countless academic hacks, well-organized cyber assaults, and even nation-state security breaches with IoT devices being the target. This chapter will detail several aspects of such breaches and types of remediation any architect must consider to make a consumer or enterprise IoT deployment a good citizen of the internet. We explore the proposed Congressional Act to secure the IoT, and understand the motivation and impact of such government mandate.
The chapter will checklist the typical security provisions needed for IoT, or any network component. Details of new technologies such as blockchains and Software Defined Perimeters will also be explored to provide insight into future technologies that will be needed to secure the IoT.
- Introduction to DevOps with Kubernetes
- TIBCO Spotfire:A Comprehensive Primer(Second Edition)
- 數(shù)據(jù)產(chǎn)品經(jīng)理:解決方案與案例分析
- 人工智能趣味入門:光環(huán)板程序設(shè)計
- 新編計算機組裝與維修
- 菜鳥起飛系統(tǒng)安裝與重裝
- 網(wǎng)絡(luò)布線與小型局域網(wǎng)搭建
- 電腦上網(wǎng)輕松入門
- Working with Linux:Quick Hacks for the Command Line
- 未來學徒:讀懂人工智能飛馳時代
- 菜鳥起飛電腦組裝·維護與故障排查
- 從機器學習到無人駕駛
- 巧學活用Photoshop
- Arduino創(chuàng)意機器人入門:基于ArduBlock(第2版)
- 單片機硬件接口電路及實例解析