更新时间:2021-08-20 10:33:12
封面
版权页
Credits
About the Authors
About the Reviewer
www.PacktPub.com
eBooks discount offers and more
Preface
What this book covers
What you need for this book
Who this book is for
Conventions
Reader feedback
Customer support
Chapter 1. A Brave New World
Defining the IoT
Why cross-industry collaboration is vital
IoT uses today
The IoT in the enterprise
The IoT of the future and the need to secure
Summary
Chapter 2. Vulnerabilities Attacks and Countermeasures
Primer on threats vulnerability and risks (TVR)
Primer on attacks and countermeasures
Today's IoT attacks
Lessons learned and systematic approaches
Chapter 3. Security Engineering for IoT Development
Building security in to design and development
Secure design
Chapter 4. The IoT Security Lifecycle
The secure IoT system implementation lifecycle
Chapter 5. Cryptographic Fundamentals for IoT Security Engineering
Cryptography and its role in securing the IoT
Cryptographic module principles
Cryptographic key management fundamentals
Examining cryptographic controls for IoT protocols
Future directions of the IoT and cryptography
Chapter 6. Identity and Access Management Solutions for the IoT
An introduction to identity and access management for the IoT
The identity lifecycle
Authentication credentials
IoT IAM infrastructure
Authorization and access control
Chapter 7. Mitigating IoT Privacy Concerns
Privacy challenges introduced by the IoT
Guide to performing an IoT PIA
PbD principles
Privacy engineering recommendations
Chapter 8. Setting Up a Compliance Monitoring Program for the IoT
IoT compliance
A complex compliance environment
Chapter 9. Cloud Security for the IoT
Cloud services and the IoT
Exploring cloud service provider IoT offerings
Cloud IoT security controls
Tailoring an enterprise IoT cloud security architecture
New directions in cloud-enabled IOT computing
Chapter 10. IoT Incident Response
Threats both to safety and security
Planning and executing an IoT incident response
Index