- Practical Internet of Things Security
- Brian Russell Drew Van Duren
- 137字
- 2021-08-20 10:32:59
Chapter 2. Vulnerabilities, Attacks, and Countermeasures
This chapter elaborates on attack methods against IoT implementations and deployments, how attacks are organized into attack trees, and how IoT cyber-physical systems complicate the threat landscape. We then rationalize a systematic methodology for incorporating countermeasures to secure the IoT. We will explore both typical and unique vulnerabilities seen within various layers of the IoT technology stack and describe new ways in which electronic and physical threats interact. We provide a tailored approach to threat modeling to show the reader how to perform usable IoT threat modeling in their own organizations.
We explore vulnerabilities, attacks, and countermeasures, and methods of managing them through the following chapter subsections:
- Primer on threats, vulnerability, and risk
- Primer on attacks and countermeasures
- Today's IoT attacks
- Lessons learned—the use of systematic approaches
推薦閱讀
- Hands-On Machine Learning with scikit:learn and Scientific Python Toolkits
- 基于Java技術的Web應用開發
- Python Geospatial Development(Second Edition)
- Scala謎題
- Java編程技術與項目實戰(第2版)
- Python Web自動化測試設計與實現
- HTML5與CSS3權威指南
- iOS Development with Xamarin Cookbook
- SCRATCH編程課:我的游戲我做主
- Python滲透測試編程技術:方法與實踐(第2版)
- 高質量程序設計指南:C++/C語言
- C++面向對象程序設計
- Linux Networking Cookbook
- Java語言GUI程序設計
- HTML 5與CSS 3權威指南(第4版·上冊)