官术网_书友最值得收藏!

Primer on threats, vulnerability, and risks 

A substantial amount of academic wrangling has evolved competing definitions for the concepts of threats, vulnerability, and risks. In the interest of keeping this volume practical and usable, we first revisit in this section what the information assurance industry has termed the five pillars of information assurance. These pillars, or domains, of information assurance represent the highest-level categories of assurance in an information system. Next, we will introduce two additional pillars that are critically important in cyber-physical systems. Once introduced, we then explore IoT threats, vulnerabilities, and risks.

主站蜘蛛池模板: 丽江市| 章丘市| 察雅县| 宁德市| 天台县| 江华| 曲水县| 个旧市| 拉萨市| 博罗县| 东乌珠穆沁旗| 兴化市| 股票| 梁河县| 巴彦县| 陇西县| 珲春市| 内丘县| 莆田市| 雷山县| 若羌县| 阳山县| 广安市| 黔南| 鲁山县| 广元市| 弥渡县| 泰州市| 烟台市| 禹州市| 中江县| 山阴县| 太和县| 诏安县| 湖北省| 开平市| 怀化市| 宁阳县| 双鸭山市| 莒南县| 万全县|