官术网_书友最值得收藏!

Part 5 – Threat and security in IoT

We conclude the book with a survey of IoT compromises and attacks. In many cases, IoT systems will not be secured in a home, or in a company. They will be in the public, in very remote areas, in moving vehicles, or even inside a person. The IoT represents the single biggest attack surface for any type of cyber attack. We have seen countless academic hacks, well-organized cyber assaults, and even nation-state security breaches with IoT devices being the target. This chapter will detail several aspects of such breaches and types of remediation any architect must consider to make a consumer or enterprise IoT deployment a good citizen of the internet. We explore the proposed Congressional Act to secure the IoT, and understand the motivation and impact of such government mandate.  

The chapter will checklist the typical security provisions needed for IoT, or any network component. Details of new technologies such as blockchains and Software Defined Perimeters will also be explored to provide insight into future technologies that will be needed to secure the IoT.

主站蜘蛛池模板: 西贡区| 鄂伦春自治旗| 临颍县| 揭东县| 竹溪县| 双牌县| 洞头县| 漳浦县| 教育| 万安县| 子长县| 永丰县| 汉中市| 北宁市| 文登市| 镇坪县| 怀安县| 连云港市| 浦北县| 宝鸡市| 城步| 抚远县| 乌兰浩特市| 通渭县| 宁武县| 武隆县| 布拖县| 南雄市| 卓资县| 营口市| 安龙县| 衡山县| 黑山县| 迁西县| 米泉市| 陆川县| 西乌珠穆沁旗| 房山区| 资阳市| 灵山县| 大宁县|