Fundamentals of IoT Security [Video]

More Information
Learn

In this course we will:

  • Deep dive into common IoT components and technologies to protect your systems and devices.
  • Explore common IoT use cases across Industries for connected vehicles, microgrids and enterprise drone systems
  • Learn current security issues related to the IoT and common security architectures
  • Identify Threats, Vulnerabilities and Risks
  • Walk through a real-world threat model for IoT systems and identify top priority risks
  • Incorporating privacy controls into the new IoT systems designs
  • Discuss privacy regulations and standards that apply to securing IoT systems and keeping stakeholder information private.
  • In-depth exploration of privacy challenges and mitigations for the IoT
About

The Internet of things is the network of physical objects or things embedded with electronics, software, sensors and network connectivity which enables these objects to collect and exchange data.

In this volume, Fundamentals of IOT Security, we will cover fundamental aspects of the Internet of Things, to include a review of use cases across various industries, we will discuss common IoT components and technologies to provide a baseline understanding of the systems and devices that you need to protect.We will also review common security architectures that can be applied to IoT systems, and discusses regulations and standards that apply to securing IoT systems.We will study of IOT components such as the IoT (hardware, real-time operating systems (RTOS), Application Programming Interfaces (APIs), messaging and communication protocols and backend services. We will discuss threats to IoT systems, attack vectors, current security regulations and standards and common security architectures. We will examine Privacy by Design (PbD) principles and walk through an example Privacy Impact Assessment (PIA).

By the end of this volume, you will understand the fundamentals of IoT systems and IoT security and be able to identify threats and required mitigations to their own IoT systems.

Style and Approach

This video takes a detailed, step-by-step approach to IOT systems, technologies, architecture and its threat models.

Features
  • Deep dives on threats faced by innovative IoT systems
  • This course will be filled with practical examples learn the techniques and methodologies of building and securing robust Internet of Things (IoT) systems.
  • Step by step guide to IoT threat modeling
Course Length 2 hours 25 minutes
ISBN 9781788392075
Date Of Publication 24 Nov 2017

Authors

Brian Russell

Brian Russell is the founder of TrustThink, LLC, where he leads multiple efforts towards the development of trusted IoT solutions. He has over 20 years of information security experience and has led complex system security engineering programs in the areas of cryptographic modernization, cryptographic key management, unmanned aerial systems, and connected vehicle security. He is the co-chair of the Cloud Security Alliance (CSA) IoT Working Group and was the recipient of the 2015 and 2016 CSA Ron Knode Service Award. Brian is an adjunct professor at the University of San Diego (USD) in the Cyber Security Operations and Leadership program.