- Practical Internet of Things Security
- Brian Russell Drew Van Duren
- 74字
- 2021-06-10 18:42:33
Summary
This chapter explored IoT vulnerabilities, attacks, and countermeasures by illustrating how an organization can practically define, characterize, and model an IoT system's threat posture. With a thorough understanding of the security (and in some cases, safety) risks, appropriate security architectural development can commence so that appropriate mitigations are developed and deployed to systems and devices throughout the enterprise.
In Chapter 3, Approaches to Secure Development, we will discuss the IoT security life cycle.
推薦閱讀
- CTF實戰:技術、解題與進階
- Metasploit Penetration Testing Cookbook(Second Edition)
- 工業互聯網安全
- 黑客攻防入門秘笈
- Preventing Digital Extortion
- 代碼審計:企業級Web代碼安全架構
- Computer Forensics with FTK
- Learning Devise for Rails
- 計算機網絡安全基礎(第5版)
- Falco云原生安全:Falco原理、實踐與擴展
- 云原生安全技術實踐指南
- 信息安全導論(第2版)
- End to End GUI Development with Qt5
- 持續集成:軟件質量改進和風險降低之道
- Hands-On Artificial Intelligence for Cybersecurity