官术网_书友最值得收藏!

Chapter 2. Vulnerabilities, Attacks, and Countermeasures

This chapter elaborates on attack methods against IoT implementations and deployments, how attacks are organized into attack trees, and how IoT cyber-physical systems complicate the threat landscape. We then rationalize a systematic methodology for incorporating countermeasures to secure the IoT. We will explore both typical and unique vulnerabilities seen within various layers of the IoT technology stack and describe new ways in which electronic and physical threats interact. We provide a tailored approach to threat modeling to show the reader how to perform usable IoT threat modeling in their own organizations.

We explore vulnerabilities, attacks, and countermeasures, and methods of managing them through the following chapter subsections:

  • Primer on threats, vulnerability, and risk
  • Primer on attacks and countermeasures
  • Today's IoT attacks
  • Lessons learned—the use of systematic approaches
主站蜘蛛池模板: 涞水县| 延津县| 西青区| 溧水县| 广丰县| 闵行区| 泽库县| 宜宾市| 日喀则市| 洞口县| 晋州市| 景泰县| 淮滨县| 西贡区| 安宁市| 黄浦区| 利津县| 陆川县| 宜春市| 青州市| 密山市| 诸城市| 鹤山市| 长宁区| 镇坪县| 永城市| 淮南市| 济宁市| 仙游县| 泗洪县| 东方市| 吉首市| 玉环县| 体育| 弥渡县| 霍州市| 堆龙德庆县| 台中市| 蒲江县| 建昌县| 南城县|