官术网_书友最值得收藏!

Primer on attacks and countermeasures

Now that we have briefly visited threats, vulnerabilities, and risk, let's dive into greater detail on the types and compositions of attacks present in the IoT and how they can be put together to perform attack campaigns. In this section, we will also introduce attack trees (and fault trees) to help readers visualize and communicate how real-world attacks can happen. It is also our hope that they gain wider adoption and use in broader threat modeling activities, not unlike the threat model example later in this chapter.

主站蜘蛛池模板: 金平| 托里县| 邵武市| 武定县| 珠海市| 治多县| 陇南市| 奎屯市| 富阳市| 沂水县| 凤城市| 城步| 景泰县| 江油市| 玉田县| 垣曲县| 兴宁市| 五家渠市| 红安县| 喜德县| 高要市| 苍梧县| 桃园县| 德惠市| 和平区| 天门市| 北票市| 永宁县| 沙坪坝区| 潮安县| 钟山县| 青神县| 咸丰县| 香格里拉县| 长丰县| 缙云县| 阿图什市| 桓仁| 禄丰县| 安顺市| 牙克石市|