官术网_书友最值得收藏!

Vulnerabilities, Attacks, and Countermeasures

This chapter elaborates on attack methods against IoT implementations and deployments, how attacks are organized into attack trees, and how IoT cyber-physical systems complicate the threat landscape. We then rationalize a systematic methodology for incorporating countermeasures to secure the IoT. We will explore both typical and unique vulnerabilities seen within various layers of an IoT technology stack, and describe new ways in which electronic and physical threats interact. We provide a tailored approach to threat modeling to show the reader how to develop and maintain usable threat models in their own organizations.

We will explore vulnerabilities, attacks, and countermeasures, and methods of managing them through the following chapter subsections:

  • Primer on threats, vulnerability, and risk
  • Primer on attacks and countermeasures
  • Today's IoT attacks
  • Lessons learned—the use of systematic approaches
主站蜘蛛池模板: 洛宁县| 宝丰县| 郎溪县| 平山县| 莱州市| 黑龙江省| 乌兰察布市| 宜黄县| 潍坊市| 昌宁县| 兰考县| 苏尼特左旗| 色达县| 象山县| 天全县| 大同县| 桑植县| 津南区| 宁远县| 田东县| 榆树市| 宜宾县| 和硕县| 星座| 华宁县| 威宁| 潍坊市| 灵宝市| 牟定县| 通辽市| 辉南县| 梁山县| 谷城县| 湖南省| 平昌县| 冕宁县| 富平县| 六枝特区| 荃湾区| 庐江县| 肇源县|