官术网_书友最值得收藏!

Part 5 – Threat and security in IoT

We conclude the book with a survey of IoT compromises and attacks. In many cases, IoT systems will not be secured in a home, or in a company. They will be in the public, in very remote areas, in moving vehicles, or even inside a person. The IoT represents the single biggest attack surface for any type of cyber attack. We have seen countless academic hacks, well-organized cyber assaults, and even nation-state security breaches with IoT devices being the target. This chapter will detail several aspects of such breaches and types of remediation any architect must consider to make a consumer or enterprise IoT deployment a good citizen of the internet. We explore the proposed Congressional Act to secure the IoT, and understand the motivation and impact of such government mandate.  

The chapter will checklist the typical security provisions needed for IoT, or any network component. Details of new technologies such as blockchains and Software Defined Perimeters will also be explored to provide insight into future technologies that will be needed to secure the IoT.

主站蜘蛛池模板: 晋江市| 关岭| 佛冈县| 溆浦县| 巴马| 衢州市| 安多县| 宜兴市| 永顺县| 元朗区| 安多县| 通河县| 阳春市| 新晃| 漳浦县| 开封县| 罗平县| 呼玛县| 集贤县| 翼城县| 平遥县| 恩施市| 内乡县| 老河口市| 永昌县| 临高县| 鲁山县| 和林格尔县| 云浮市| 多伦县| 敦煌市| 错那县| 福安市| 博客| 汝城县| 扎鲁特旗| 克拉玛依市| 惠州市| 扬中市| 舟曲县| 凤山县|