Lifecycle IoT Security for Engineers

Lifecycle IoT Security for Engineers
Author :
Publisher : Artech House
Total Pages : 230
Release :
ISBN-10 : 9781630818043
ISBN-13 : 1630818046
Rating : 4/5 (046 Downloads)

Book Synopsis Lifecycle IoT Security for Engineers by : Kaustubh Dhondge

Download or read book Lifecycle IoT Security for Engineers written by Kaustubh Dhondge and published by Artech House. This book was released on 2021-09-30 with total page 230 pages. Available in PDF, EPUB and Kindle. Book excerpt: This comprehensive resource provides a thorough introduction to the security risks, attack vectors and vulnerabilities an Internet of things (IoT) product and its network can face at different phases of its lifecycle. The risks at each stage of the development and operations (DevOps) lifecycle of an IoT product are analyzed. Examples of recent, relevant security threats faced by the industry are discussed and why the security breach happened, how it was resolved, and what could have been done to avoid them will be explained. Readers will learn the best practices to secure their IoT products, and networks in a holistic way. IoT and the diverse and unique nature of IoT applications across the commercial and industrial landscape, are introduced, including the need for securing IoT. The lifecycle of IoT security, specifically the security implementations that need to be carried out at various stages in the operational process of an IoT service are presented, as well as the security requirements during the planning, security integration, operational, maintenance, and planned discontinuation phase of an IoT service. The vulnerabilities in IoT, the various attack vectors exploited by attackers, and preventive measures that can be undertaken to avoid these security attacks are also explored. Readers are acclimated with various steps that must be undertaken to prepare for IoT security attacks, and techniques that can be employed to detect them. Key challenges involved with implementing appropriate levels of security in IoT due to heterogeneity, interoperability, human errors, and commercial factors are discussed, as well as the need for regulatory guidance for the IoT industry and highlights specific examples of regulations in leading markets across the globe.


Lifecycle IoT Security for Engineers Related Books

Lifecycle IoT Security for Engineers
Language: en
Pages: 230
Authors: Kaustubh Dhondge
Categories: Computers
Type: BOOK - Published: 2021-09-30 - Publisher: Artech House

DOWNLOAD EBOOK

This comprehensive resource provides a thorough introduction to the security risks, attack vectors and vulnerabilities an Internet of things (IoT) product and i
Practical Internet of Things Security
Language: en
Pages: 336
Authors: Brian Russell
Categories: Computers
Type: BOOK - Published: 2016-06-29 - Publisher: Packt Publishing Ltd

DOWNLOAD EBOOK

A practical, indispensable security guide that will navigate you through the complex realm of securely building and deploying systems in our IoT-connected world
Intelligent Sustainable Systems
Language: en
Pages: 866
Authors: Jennifer S. Raj
Categories: Technology & Engineering
Type: BOOK - Published: 2023-06-15 - Publisher: Springer Nature

DOWNLOAD EBOOK

This book features research papers presented at the 6th International Conference on Intelligent Sustainable Systems (ICISS 2023), held at SCAD College of Engine
Orchestrating and Automating Security for the Internet of Things
Language: en
Pages: 1146
Authors: Anthony Sabella
Categories: Computers
Type: BOOK - Published: 2018-06-04 - Publisher: Cisco Press

DOWNLOAD EBOOK

Master powerful techniques and approaches for securing IoT systems of all kinds–current and emerging Internet of Things (IoT) technology adoption is accelerat
Modern Vulnerability Management: Predictive Cybersecurity
Language: en
Pages: 237
Authors: Michael Roytman
Categories: Computers
Type: BOOK - Published: 2023-03-31 - Publisher: Artech House

DOWNLOAD EBOOK

This book comprehensively covers the principles of Risk-based vulnerability management (RBVM) – one of the most challenging tasks in cybersecurity -- from the