Practical Internet of Things Security

A practical, indispensable security guide that will navigate you through the complex realm of securely building and deploying systems in our IoT-connected world

Practical Internet of Things Security

This ebook is included in a Mapt subscription
Brian Russell, Drew Van Duren

5 customer reviews
A practical, indispensable security guide that will navigate you through the complex realm of securely building and deploying systems in our IoT-connected world
$0.00
$18.00
$44.99
$29.99p/m after trial
RRP $35.99
RRP $44.99
Subscription
eBook
Print + eBook
Start 30 Day Trial
Subscribe and access every Packt eBook & Video.
 
  • 5,000+ eBooks & Videos
  • 50+ New titles a month
  • 1 Free eBook/Video to keep every month
Start Free Trial
 
Code Files
Preview in Mapt

Book Details

ISBN 139781785889639
Paperback336 pages

Book Description

With the advent of Intenret of Things (IoT), businesses will be faced with defending against new types of threats. The business ecosystem now includes cloud computing infrastructure, mobile and fixed endpoints that open up new attack surfaces, a desire to share information with many stakeholders and a need to take action quickly based on large quantities of collected data. . It therefore becomes critical to ensure that cyber security threats are contained to a minimum when implementing new IoT services and solutions. . The interconnectivity of people, devices, and companies raises stakes to a new level as computing and action become even more mobile, everything becomes connected to the cloud, and infrastructure is strained to securely manage the billions of devices that will connect us all to the IoT. This book shows you how to implement cyber-security solutions, IoT design best practices and risk mitigation methodologies to address device and infrastructure threats to IoT solutions.

This book will take readers on a journey that begins with understanding the IoT and how it can be applied in various industries, goes on to describe the security challenges associated with the IoT, and then provides a set of guidelines to architect and deploy a secure IoT in your Enterprise. The book will showcase how the IoT is implemented in early-adopting industries and describe how lessons can be learned and shared across diverse industries to support a secure IoT.

Table of Contents

Chapter 1: A Brave New World
Defining the IoT
Why cross-industry collaboration is vital
IoT uses today
The IoT in the enterprise
The IoT of the future and the need to secure
Summary
Chapter 2: Vulnerabilities, Attacks, and Countermeasures
Primer on threats, vulnerability, and risks (TVR)
Primer on attacks and countermeasures
Today's IoT attacks
Lessons learned and systematic approaches
Summary
Chapter 3: Security Engineering for IoT Development
Building security in to design and development
Secure design
Summary
Chapter 4: The IoT Security Lifecycle
The secure IoT system implementation lifecycle
Summary
Chapter 5: Cryptographic Fundamentals for IoT Security Engineering
Cryptography and its role in securing the IoT
Cryptographic module principles
Cryptographic key management fundamentals
Examining cryptographic controls for IoT protocols
Future directions of the IoT and cryptography
Summary
Chapter 6: Identity and Access Management Solutions for the IoT
An introduction to identity and access management for the IoT
The identity lifecycle
Authentication credentials
IoT IAM infrastructure
Authorization and access control
Summary
Chapter 7: Mitigating IoT Privacy Concerns
Privacy challenges introduced by the IoT
Guide to performing an IoT PIA
PbD principles
Privacy engineering recommendations
Summary
Chapter 8: Setting Up a Compliance Monitoring Program for the IoT
IoT compliance
A complex compliance environment
Summary
Chapter 9: Cloud Security for the IoT
Cloud services and the IoT
Exploring cloud service provider IoT offerings
Cloud IoT security controls
Tailoring an enterprise IoT cloud security architecture
New directions in cloud-enabled IOT computing
Summary
Chapter 10: IoT Incident Response
Threats both to safety and security
Planning and executing an IoT incident response
Summary

What You Will Learn

  • Learn how to break down cross-industry barriers by adopting the best practices for IoT deployments
  • Build a rock-solid security program for IoT that is cost-effective and easy to maintain
  • Demystify complex topics such as cryptography, privacy, and penetration testing to improve your security posture
  • See how the selection of individual components can affect the security posture of the entire system
  • Use Systems Security Engineering and Privacy-by-design principles to design a secure IoT ecosystem
  • Get to know how to leverage the burdgening cloud-based systems that will support the IoT into the future.

Authors

Table of Contents

Chapter 1: A Brave New World
Defining the IoT
Why cross-industry collaboration is vital
IoT uses today
The IoT in the enterprise
The IoT of the future and the need to secure
Summary
Chapter 2: Vulnerabilities, Attacks, and Countermeasures
Primer on threats, vulnerability, and risks (TVR)
Primer on attacks and countermeasures
Today's IoT attacks
Lessons learned and systematic approaches
Summary
Chapter 3: Security Engineering for IoT Development
Building security in to design and development
Secure design
Summary
Chapter 4: The IoT Security Lifecycle
The secure IoT system implementation lifecycle
Summary
Chapter 5: Cryptographic Fundamentals for IoT Security Engineering
Cryptography and its role in securing the IoT
Cryptographic module principles
Cryptographic key management fundamentals
Examining cryptographic controls for IoT protocols
Future directions of the IoT and cryptography
Summary
Chapter 6: Identity and Access Management Solutions for the IoT
An introduction to identity and access management for the IoT
The identity lifecycle
Authentication credentials
IoT IAM infrastructure
Authorization and access control
Summary
Chapter 7: Mitigating IoT Privacy Concerns
Privacy challenges introduced by the IoT
Guide to performing an IoT PIA
PbD principles
Privacy engineering recommendations
Summary
Chapter 8: Setting Up a Compliance Monitoring Program for the IoT
IoT compliance
A complex compliance environment
Summary
Chapter 9: Cloud Security for the IoT
Cloud services and the IoT
Exploring cloud service provider IoT offerings
Cloud IoT security controls
Tailoring an enterprise IoT cloud security architecture
New directions in cloud-enabled IOT computing
Summary
Chapter 10: IoT Incident Response
Threats both to safety and security
Planning and executing an IoT incident response
Summary

Book Details

ISBN 139781785889639
Paperback336 pages
Read More
From 5 reviews

Read More Reviews