官术网_书友最值得收藏!

Summary

This chapter explored development methodologies that can be used to develop IoT products. We discussed the waterfall, Spiral, Agile, and DevOps methodologies, and reviewed ways in which security engineering can be used to define and track security requirements, and build security into the design phase of a product.

We discussed non-functional requirements, including security, safety, and resilience, and touched on the need for software transparency and automation in the verification and validation process. 

In Chapter 4Secure Design of IoT Devices, we will discuss the challenges that IoT system developers face when trying to secure their systems, and a set of secure design goals for IoT systems.

主站蜘蛛池模板: 正镶白旗| 响水县| 时尚| 合作市| 威宁| 新闻| 博湖县| 大英县| 通辽市| 玛纳斯县| 奉节县| 常熟市| 浙江省| 芦山县| 漯河市| 依兰县| 城固县| 肇东市| 城口县| 古交市| 株洲县| 唐山市| 新沂市| 虹口区| 云安县| 谢通门县| 故城县| 东至县| 霞浦县| 佛山市| 定西市| 尼勒克县| 察雅县| 马山县| 固始县| 汝州市| 太康县| 吴江市| 海南省| 荣成市| 汤原县|