Lifecycle IoT Security for Engineers

This comprehensive resource provides a thorough introduction to the security risks, attack vectors and vulnerabilities an Internet of things (IoT) product and its network can face at different phases of its lifecycle. The risks at each stage of the development and operations (DevOps) lifecycle of an...

Full description

Saved in:
Bibliographic Details
Main Author: Kaustubh, Dhondge
Format: eBook
Language:English
Published: Norwood : Artech House, 2021.
Subjects:
Online Access:Click for online access

MARC

LEADER 00000cam a2200000 4500
001 on1288210815
003 OCoLC
005 20240909213021.0
006 m o d
007 cr |||||||||||
008 211211s2021 xx o ||| 0 eng d
040 |a EBLCP  |b eng  |c EBLCP  |d EBLCP  |d OCLCQ  |d STF  |d OCLCQ  |d SXB  |d OCLCO  |d OCLCQ  |d UEJ 
019 |a 1287129218  |a 1388674275 
020 |a 9781630818043 
020 |a 1630818046 
035 |a (OCoLC)1288210815  |z (OCoLC)1287129218  |z (OCoLC)1388674275 
050 4 |a TK5105.8857 
072 0 |a COM053000 
049 |a HCDD 
100 1 |a Kaustubh, Dhondge. 
245 1 0 |a Lifecycle IoT Security for Engineers  |h [electronic resource]. 
260 |a Norwood :  |b Artech House,  |c 2021. 
300 |a 1 online resource (219 p.) 
500 |a Description based upon print version of record. 
520 |a This comprehensive resource provides a thorough introduction to the security risks, attack vectors and vulnerabilities an Internet of things (IoT) product and its network can face at different phases of its lifecycle. The risks at each stage of the development and operations (DevOps) lifecycle of an IoT product are analyzed. Examples of recent, relevant security threats faced by the industry are discussed and why the security breach happened, how it was resolved, and what could have been done to avoid them will be explained. Readers will learn the best practices to secure their IoT products, and networks in a holistic way.IoT and the diverse and unique nature of IoT applications across the commercial and industrial landscape, are introduced, including the need for securing IoT. The lifecycle of IoT security, specifically the security implementations that need to be carried out at various stages in the operational process of an IoT service are presented, as well as the security requirements during the planning, security integration, operational, maintenance, and planned discontinuation phase of an IoT service. The vulnerabilities in IoT, the various attack vectors exploited by attackers, and preventive measures that can be undertaken to avoid these security attacks are also explored.Readers are acclimated with various steps that must be undertaken to prepare for IoT security attacks, and techniques that can be employed to detect them. Key challenges involved with implementing appropriate levels of security in IoT due to heterogeneity, interoperability, human errors, and commercial factors are discussed, as well as the need for regulatory guidance for the IoT industry and highlights specific examples of regulations in leading markets across the globe. 
505 0 |a Lifecycle IoT Security for Engineers -- Contents -- Foreword -- Preface -- Acknowledgments -- 1 Introduction to IoT and Its Applications -- 1.1 Defining the IoT -- 1.2 Classifying Industrial, Enterprise, and Consumer IoT Applications -- 1.3 Why IoT Needs Securing -- 1.4 Summary -- References -- 2 Lifecycle of IoT Security -- 2.1 IoT Security Implementation -- 2.2 Integrating the Security Measures into IoT Services -- 2.3 Operation of the IoT Services -- 2.4 Maintaining the IoT Infrastructure -- 2.5 Planned Degradation and Discontinuation of the IoT Services -- 2.6 Summary -- References -- 3 Vulnerabilities in IoT Security -- 3.1 Insufficient Physical Hardening -- 3.2 Insecure Cloud and Network Services -- 3.3 Device-Level Vulnerabilities and Mismanagements -- 3.4 Poor Password Practices and Identity Management -- 3.5 Inappropriate Cryptographic Measures -- 3.6 Weak Update Protocols -- 3.7 Summary -- References -- 4 IoT Security Attack Vectors and Actors -- 4.1 Understanding the Motivations to Attack IoT Systems -- 4.2 Actors Involved in IoT Security and Attacks -- 4.3 IoT Device-Level Attacks -- 4.4 IoT Network Attacks -- 4.5 Cloud Service Attacks -- 4.6 Summary -- References -- 5 Preventive and Defensive Measures to Counter IoT Security Threats -- 5.1 Secure by Design -- 5.2 IoT Device-Level Security -- 5.3 IoT Network Security -- 5.4 Cloud Service Security -- 5.5 Summary -- 6 Detection and Identification of IoT Security Attacks -- 6.1 Setting Up IoT Security Incident Protocols -- 6.2 Establishing Security Incident Response Teams -- 6.3 Monitoring and Penetrating IoT Services -- 6.4 Summary -- References -- 7 Practical Challenges in Implementing Appropriate Level of Security -- 7.1 Challenges of Inherent Heterogeneity -- 7.2 Interoperability Between Diverse Stakeholders -- 7.3 The Human Factor Forming a Weak Link in IoT Security. 
505 8 |a 7.4 Commercial and Performance-Oriented Factors -- 7.5 Summary -- References -- 8 Regulatory Guidance for the IoT Industry -- 8.1 Need for Regulatory Guidance on IoT Security and Its Global Directions -- 8.2 Internet Research Task Force Request for Comments 8576 -- 8.3 U.S. NIST Interagency/Internal Report 8259 and 8259A -- 8.4 ETSI TS 103 645 -- 8.5 Summary -- References -- 9 Social and Commercial Impacts of IoT Security Failures -- 9.1 Large-Scale Impact of IoT Services -- 9.2 Unavailability of Life-Saving Services -- 9.3 Loss of Privacy and Personal Data -- 9.4 Degraded Consumer Confidence -- 9.5 Threat to Critical Infrastructure and National Security -- 9.6 Commercial Impacts and Losses -- 9.7 Summary -- References -- 10 Recovering from IoT Security Incidents -- 10.1 Incident Containment -- 10.2 Security Threat Redressal -- 10.3 Patching Security Updates -- 10.4 Communicating with the Stakeholders -- 10.5 Summary -- References -- About the Author -- Index. 
650 0 |a Internet of things--Security measures. 
650 0 |a Computer security. 
776 0 8 |i Print version:  |a Kaustubh, Dhondge  |t Lifecycle IoT Security for Engineers  |d Norwood : Artech House,c2021  |z 9781630818036 
856 4 0 |u https://ebookcentral.proquest.com/lib/holycrosscollege-ebooks/detail.action?docID=6805253  |y Click for online access 
903 |a EBC-AC 
994 |a 92  |b HCD