Search icon
Arrow left icon
All Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Newsletters
Free Learning
Arrow right icon
Internet of Things from Scratch

You're reading from  Internet of Things from Scratch

Product type Book
Published in Feb 2024
Publisher Packt
ISBN-13 9781837638543
Pages 438 pages
Edition 1st Edition
Languages
Author (1):
Renaldi Gondosubroto Renaldi Gondosubroto
Profile icon Renaldi Gondosubroto

Table of Contents (22) Chapters

Preface 1. Part 1: Getting Started with the Internet of Things
2. Chapter 1: An Introduction to IoT Architecture, Hardware, and Real-Life Applications 3. Chapter 2: Understanding and Designing IoT Networks 4. Chapter 3: Integrating Application Protocols 5. Chapter 4: Examining Communication and Connectivity Technologies 6. Part 2: Developing and Optimizing IoT Systems for Smart Environments
7. Chapter 5: Realizing Wireless Sensor Networks within Smart Spaces 8. Chapter 6: Creating Applications on the Edge 9. Chapter 7: Working with Cloud Computing to Power IoT Solutions 10. Chapter 8: Designing for Interoperability 11. Part 3: Operating, Maintaining, and Securing IoT Networks
12. Chapter 9: Operating and Monitoring IoT Networks 13. Chapter 10: Working with Data and Analytics 14. Chapter 11: Examining Security and Privacy in IoT 15. Chapter 12: Exploring and Innovating with Open Source IoT 16. Part 4: Delving into Complex Systems and the Future of IoT
17. Chapter 13: Developing IoT Solutions for Digital Transformation within Industry 4.0 18. Chapter 14: Architecting Complex, Holistic IoT Environments 19. Chapter 15: Looking Ahead into the Future of IoT 20. Index 21. Other Books You May Enjoy

Risk management within the IoT landscape

We have seen the usage of data analytics in the past two sections and how it has been beneficial for our workloads. Now, let’s look at how it can benefit industry cases and how we can accordingly evaluate our deployments based on best practices that are set out for us.

Threat modeling for IoT systems

There are often many steps that can be taken for threat modeling, but mostly there are nine steps that generally are abided by:

  1. Identify the scope: Identify the IoT devices, networks, applications, and data involved in the IoT network.
  2. Create an architecture diagram: Create a diagram to map out the IoT network, including devices, sensors, gateways, networks, and cloud services. This will help in understanding the dependencies and interactions between components.
  3. Identify threats: Identify potential threats to the IoT network, such as unauthorized access, data tampering, malware, physical theft, and data breaches. Conduct...
lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at €14.99/month. Cancel anytime}