- Practical Internet of Things Security
- Brian Russell Drew Van Duren
- 251字
- 2021-06-10 18:42:31
Step 2 – create a system/architecture overview
This step provides a solid foundation for understanding not only the expected functionality of the IoT system, but also the potential misuse of the system. There are three sub-steps to this part of the threat modeling process:
- Start with documenting expected functionality.
- Create an architectural diagram that details the new IoT system. During this process, trust boundaries in the architecture should be established. Trust boundaries should elucidate the trust between actors and their directionality.
- Identify technologies used within the IoT system.
Documentation of system functionality is best accomplished by creating a set of use cases such as those that follow:

An architectural diagram of the system details the components of the system, their interactions, and the protocols employed in their interactions. The following is an architectural diagram of our example smart parking solution:
Once the logical architecture view is complete, it is important to identify and examine the specific technologies that will comprise the IoT system. This includes understanding and documenting lower-level details regarding the endpoint devices, such as the processor types and operating systems.
The endpoint details provide the information needed to understand the specific types of potential vulnerabilities that may eventually be exposed and define processes for patch management and firmware updates. Understanding and documenting the protocols that are used by each IoT device will also allow for updates to the architecture, especially if gaps are found in the cryptographic controls applied to the data transmitted throughout the system and the organization:

- SASE原理、架構(gòu)與實踐
- 零信任網(wǎng)絡(luò):在不可信網(wǎng)絡(luò)中構(gòu)建安全系統(tǒng)
- Rootkit和Bootkit:現(xiàn)代惡意軟件逆向分析和下一代威脅
- 數(shù)字化轉(zhuǎn)型浪潮下的數(shù)據(jù)安全最佳實踐指南
- ARM匯編與逆向工程:藍狐卷·基礎(chǔ)知識
- 網(wǎng)絡(luò)安全應(yīng)急響應(yīng)實戰(zhàn)
- 電腦安全與攻防入門很輕松(實戰(zhàn)超值版)
- 持續(xù)集成:軟件質(zhì)量改進和風險降低之道
- 網(wǎng)絡(luò)服務(wù)安全與監(jiān)控
- 白話零信任
- 云安全深度剖析:技術(shù)原理及應(yīng)用實踐
- ATT&CK視角下的紅藍對抗實戰(zhàn)指南
- 商用密碼應(yīng)用與安全性評估
- Web安全與攻防實戰(zhàn)從新手到高手(微課超值版)
- 數(shù)據(jù)中心安全防護技術(shù)