- Practical Internet of Things Security
- Brian Russell Drew Van Duren
- 198字
- 2021-06-10 18:42:38
Engaging with the research community
Verification and validation of IoT security functionality and posture is not limited to processes conducted by the development/test team. There is a rich IoT security research community that performs independent testing of IoT products and services. These researchers will often contact vendors to discuss vulnerabilities discovered during their research.
Make it easy for these researchers to communicate this information to you, and adopt an attitude of collaboration with the community. Show your willingness to accept their input. Provide a process for responsible disclosure that they can follow, and you will have a highly talented and resourceful community aiding you in your efforts to secure your products.
Another approach to employ is the use of bug bounties. You can set a bug bounty to reward researchers for identifying vulnerabilities in your products. It is important to be very specific on the rules of engagement, including what aspects of the product or implementation are within scope.
Although the hardware aspects of the IoT make it somewhat more difficult to coordinate, there are organizations that help facilitate IoT bug bounties. BugCrowd is one such organization, offering both privately—and publicly—scoped bug bounties.
- Android應用安全實戰(zhàn):Frida協(xié)議分析
- unidbg逆向工程:原理與實踐
- 數(shù)字身份與元宇宙信任治理
- 網(wǎng)絡空間攻防技術原理
- 信息系統(tǒng)安全檢測與風險評估
- 暗戰(zhàn)亮劍:黑客滲透與防御全程實錄
- Web安全與攻防入門很輕松(實戰(zhàn)超值版)
- Getting Started with FortiGate
- Kali Linux Network Scanning Cookbook(Second Edition)
- 網(wǎng)絡安全技術與實訓(第4版)(微課版)
- Testing and Securing Android Studio Applications
- 博弈論與數(shù)據(jù)安全
- INSTANT Apple Configurator How-to
- Disaster Recovery Using VMware vSphere Replication and vCenter Site Recovery Manager
- Hands-On Artificial Intelligence for Cybersecurity