- Practical Internet of Things Security
- Brian Russell Drew Van Duren
- 92字
- 2021-06-10 18:42:28
Primer on attacks and countermeasures
Now that we have briefly visited threats, vulnerabilities, and risk, let's dive into greater detail on the types and compositions of attacks present in the IoT and how they can be put together to perform attack campaigns. In this section, we will also introduce attack trees (and fault trees) to help readers visualize and communicate how real-world attacks can happen. It is also our hope that they gain wider adoption and use in broader threat modeling activities, not unlike the threat model example later in this chapter.
推薦閱讀
- 白話網(wǎng)絡(luò)安全2:網(wǎng)安戰(zhàn)略篇
- unidbg逆向工程:原理與實(shí)踐
- 網(wǎng)絡(luò)安全意識導(dǎo)論
- 走進(jìn)新安全:讀懂網(wǎng)絡(luò)安全威脅、技術(shù)與新思想
- Getting Started with FortiGate
- 反黑命令與攻防從新手到高手(微課超值版)
- 零信任網(wǎng)絡(luò):在不可信網(wǎng)絡(luò)中構(gòu)建安全系統(tǒng)(第2版)
- Learning Devise for Rails
- 可信計(jì)算3.0工程初步(第二版)
- Bug Bounty Hunting Essentials
- Mastering Linux Security and Hardening
- Mastering Metasploit
- 企業(yè)數(shù)據(jù)安全防護(hù)指南
- 網(wǎng)絡(luò)安全監(jiān)控實(shí)戰(zhàn):深入理解事件檢測與響應(yīng)
- Blockchain Development with Hyperledger