IoT Security Issues / / Alasdair Gilchrist.

IoT Security Issues looks at the burgeoning growth of devices of all kinds controlled over the Internet of all varieties, where product comes first and security second. In this case, security trails badly. This book examines the issues surrounding these problems, vulnerabilities, what can be done to...

Full description

Saved in:
Bibliographic Details
Superior document:Title is part of eBook package: De Gruyter DG Plus eBook-Package 2017
VerfasserIn:
Place / Publishing House:Boston ;, Berlin : : De|G Press, , [2017]
©2017
Year of Publication:2017
Language:English
Online Access:
Physical Description:1 online resource (XIV, 259 p.)
Tags: Add Tag
No Tags, Be the first to tag this record!
Table of Contents:
  • Frontmatter
  • Acknowledgements
  • Contents
  • Introduction
  • Part I: Making Sense of the Hype
  • Chapter 1 – The Consumer Internet of Things
  • Part II: Security
  • Chapter 2 – It’s Not Just About the Future
  • Chapter 3 – Flawed, Insecure Devices
  • Chapter 4 – Securing the Unidentified
  • Chapter 5 – Consumer Convenience Trumps Security
  • Chapter 6 – Startups Driving the IoT
  • Chapter 7 – Cyber-Security and the Customer Experience
  • Chapter 8 – Security Requirements for the IoT
  • Chapter 9 – Re-engineering the IoT
  • Chapter 10 – IoT Production, Security and Strength
  • Chapter 11 – Wearable’s – A New Developer’s Headache
  • Chapter 12 – New Surface Threats
  • Part III: Architecting the Secure IoT
  • Chapter 13 – Designing the Secure IoT
  • Chapter 14 – Secure IoT Architecture Patterns
  • Chapter 15 – Threat Models
  • Part IV: Defending the IoT
  • Chapter 16 – Threats, Vulnerabilities and Risks
  • Chapter 17 – IoT Security Framework
  • Chapter 18 – Secure IoT Design
  • Chapter 19 – Utilizing IPv6 Security Features
  • Part V: Trust
  • Chapter 20 – The IoT of Trust
  • Chapter 21 – It’s All About the Data
  • Chapter 22 – Trusting the Device
  • Chapter 23 – Who Can We Trust?
  • Part VI: Privacy
  • Chapter 24 – Personal Private Information (PIP)
  • Chapter 25 – The U.S. and EU Data Privacy Shield
  • Part VII: Surveillance, Subterfuge and Sabotage
  • Chapter 26 – The Panopticon
  • Index