万本电子书0元读

万本电子书0元读

顶部广告

Practical Internet of Things Security电子书

售       价:¥

0人正在读 | 0人评论 9.8

作       者:Brian Russell,Drew Van Duren

出  版  社:Packt Publishing

出版时间:2016-06-01

字       数:840.2万

所属分类: 进口书 > 外文原版书 > 电脑/网络

温馨提示:数字商品不支持退换货,不提供源文件,不支持导出打印

为你推荐

  • 读书简介
  • 目录
  • 累计评论(0条)
  • 读书简介
  • 目录
  • 累计评论(0条)
A practical, indispensable security guide that will navigate you through the complex realm of securely building and deploying systems in our IoT-connected world About This Book Learn to design and implement cyber security strategies for your organization Learn to protect cyber-physical systems and utilize forensic data analysis to beat vulnerabilities in your IoT ecosystem Learn best practices to secure your data from device to the cloud Gain insight into privacy-enhancing techniques and technologies Who This Book Is For This book targets IT Security Professionals and Security Engineers (including pentesters, security architects and ethical hackers) who would like to ensure security of their organization's data when connected through the IoT. Business analysts and managers will also find it useful. What You Will Learn Learn how to break down cross-industry barriers by adopting the best practices for IoT deployments Build a rock-solid security program for IoT that is cost-effective and easy to maintain Demystify complex topics such as cryptography, privacy, and penetration testing to improve your security posture See how the selection of individual components can affect the security posture of the entire system Use Systems Security Engineering and Privacy-by-design principles to design a secure IoT ecosystem Get to know how to leverage the burdgening cloud-based systems that will support the IoT into the future. In Detail With the advent of Intenret of Things (IoT), businesses will be faced with defending against new types of threats. The business ecosystem now includes cloud computing infrastructure, mobile and fixed endpoints that open up new attack surfaces, a desire to share information with many stakeholders and a need to take action quickly based on large quantities of collected data. . It therefore becomes critical to ensure that cyber security threats are contained to a minimum when implementing new IoT services and solutions. . The interconnectivity of people, devices, and companies raises stakes to a new level as computing and action become even more mobile, everything becomes connected to the cloud, and infrastructure is strained to securely manage the billions of devices that will connect us all to the IoT. This book shows you how to implement cyber-security solutions, IoT design best practices and risk mitigation methodologies to address device and infrastructure threats to IoT solutions. This book will take readers on a journey that begins with understanding the IoT and how it can be applied in various industries, goes on to describe the security challenges associated with the IoT, and then provides a set of guidelines to architect and deploy a secure IoT in your Enterprise. The book will showcase how the IoT is implemented in early-adopting industries and describe how lessons can be learned and shared across diverse industries to support a secure IoT. Style and approach This book aims to educate readers on key areas in IoT security. It walks readers through engaging with security challenges and then provides answers on how to successfully manage IoT security and build a safe infrastructure for smart devices. After reading this book, you will understand the true potential of tools and solutions in order to build real-time security intelligence on IoT networks.
目录展开

Practical Internet of Things Security

Table of Contents

Practical Internet of Things Security

Credits

About the Authors

About the Reviewer

www.PacktPub.com

eBooks, discount offers, and more

Why subscribe?

Preface

What this book covers

What you need for this book

Who this book is for

Conventions

Reader feedback

Customer support

Errata

Piracy

Questions

1. A Brave New World

Defining the IoT

Cybersecurity versus IoT security and cyber-physical systems

Why cross-industry collaboration is vital

IoT uses today

Energy industry and smart grid

Connected vehicles and transportation

Manufacturing

Wearables

Implantables and medical devices

The IoT in the enterprise

The things in the IoT

The IoT device lifecycle

IoT device implementation

IoT service implementation

IoT device and service deployment

The hardware

Operating systems

IoT communications

Messaging protocols

MQTT

CoAP

XMPP

DDS

AMQP

Gateways

Transport protocols

Network protocols

Data link and physical protocols

IEEE 802.15.4

ZWave

Power Line Communications

Cellular communications

IoT data collection, storage, and analytics

IoT integration platforms and solutions

The IoT of the future and the need to secure

The future – cognitive systems and the IoT

Summary

2. Vulnerabilities, Attacks, and Countermeasures

Primer on threats, vulnerability, and risks (TVR)

The classic pillars of information assurance

Threats

Vulnerability

Risks

Primer on attacks and countermeasures

Common IoT attack types

Attack trees

Building an attack tree

Fault (failure) trees and CPS

Fault tree and attack tree differences

Merging fault and attack tree analysis

Example anatomy of a deadly cyber-physical attack

Today's IoT attacks

Attacks

Wireless reconnaissance and mapping

Security protocol attacks

Physical security attacks

Application security attacks

Lessons learned and systematic approaches

Threat modeling an IoT system

Step 1 – identify the assets

Step 2 – create a system/architecture overview

Step 3 – decompose the IoT system

Step 4 – identify threats

Step 5 – document the threats

Step 6 – rate the threats

Summary

3. Security Engineering for IoT Development

Building security in to design and development

Security in agile developments

Focusing on the IoT device in operation

Secure design

Safety and security design

Threat modeling

Privacy impact assessment

Safety impact assessment

Compliance

Monitoring for compliance

Security system integration

Accounts and credentials

Patching and updates

Audit and monitoring

Processes and agreements

Secure acquisition process

Secure update process

Establish SLAs

Establish privacy agreements

Consider new liabilities and guard against risk exposure

Establish an IoT physical security plan

Technology selection – security products and services

IoT device hardware

Selecting an MCU

Selecting a real-time operating system (RTOS)

IoT relationship platforms

Xively

ThingWorx

Cryptographic security APIs

Authentication/authorization

Edge

Security monitoring

Summary

4. The IoT Security Lifecycle

The secure IoT system implementation lifecycle

Implementation and integration

IoT security CONOPS document

Network and security integration

Examining network and security integration for WSNs

Examining network and security integration for connected cars

Planning for updates to existing network and security infrastructures

Planning for provisioning mechanisms

Integrating with security systems

IoT and data buses

System security verification and validation (V&V)

Security training

Security awareness training for users

Security administration training for the IoT

Secure configurations

IoT device configurations

Secure gateway and network configurations

Operations and maintenance

Managing identities, roles, and attributes

Identity relationship management and context

Attribute-based access control

Role-based access control

Consider third-party data requirements

Manage keys and certificates

Security monitoring

Penetration testing

Red and blue teams

Evaluating hardware security

The airwaves

IoT penetration test tools

Compliance monitoring

Asset and configuration management

Incident management

Forensics

Dispose

Secure device disposal and zeroization

Data purging

Inventory control

Data archiving and records management

Summary

5. Cryptographic Fundamentals for IoT Security Engineering

Cryptography and its role in securing the IoT

Types and uses of cryptographic primitives in the IoT

Encryption and decryption

Symmetric encryption

Block chaining modes

Counter modes

Asymmetric encryption

Hashes

Digital signatures

Symmetric (MACs)

Random number generation

Ciphersuites

Cryptographic module principles

Cryptographic key management fundamentals

Key generation

Key establishment

Key derivation

Key storage

Key escrow

Key lifetime

Key zeroization

Accounting and management

Summary of key management recommendations

Examining cryptographic controls for IoT protocols

Cryptographic controls built into IoT communication protocols

ZigBee

Bluetooth-LE

Near field communication (NFC)

Cryptographic controls built into IoT messaging protocols

MQTT

CoAP

DDS

REST

Future directions of the IoT and cryptography

Summary

6. Identity and Access Management Solutions for the IoT

An introduction to identity and access management for the IoT

The identity lifecycle

Establish naming conventions and uniqueness requirements

Naming a device

Secure bootstrap

Credential and attribute provisioning

Local access

Account monitoring and control

Account updates

Account suspension

Account/credential deactivation/deletion

Authentication credentials

Passwords

Symmetric keys

Certificates

X.509

IEEE 1609.2

Biometrics

New work in authorization for the IoT

IoT IAM infrastructure

802.1x

PKI for the IoT

PKI primer

Trust stores

PKI architecture for privacy

Revocation support

OCSP

OCSP stapling

SSL pinning

Authorization and access control

OAuth 2.0

Authorization and access controls within publish/subscribe protocols

Access controls within communication protocols

Summary

7. Mitigating IoT Privacy Concerns

Privacy challenges introduced by the IoT

A complex sharing environment

Wearables

Smart homes

Metadata can leak private information also

New privacy approaches for credentials

Privacy impacts on IoT security systems

New methods of surveillance

Guide to performing an IoT PIA

Overview

Authorities

Characterizing collected information

Uses of collected information

Security

Notice

Data retention

Information sharing

Redress

Auditing and accountability

PbD principles

Privacy embedded into design

Positive-sum, not zero-sum

End-to-end security

Visibility and transparency

Respect for user privacy

Privacy engineering recommendations

Privacy throughout the organization

Privacy engineering professionals

Privacy engineering activities

Summary

8. Setting Up a Compliance Monitoring Program for the IoT

IoT compliance

Implementing IoT systems in a compliant manner

An IoT compliance program

Executive oversight

Policies, procedures, and documentation

Training and education

Skills assessments

Cyber security tools

Data security

Defense-in-depth

Privacy

The IoT, network, and cloud

Threats/attacks

Certifications

Testing

Internal compliance monitoring

Install/update sensors

Automated search for flaws

Collect results

Triage

Bug fixes

Reporting

System design updates

Periodic risk assessments

Black box

White box assessments

Fuzz testing

A complex compliance environment

Challenges associated with IoT compliance

Examining existing compliance standards support for the IoT

Underwriters Laboratory IoT certification

NIST CPS efforts

NERC CIP

HIPAA/HITECH

PCI DSS

NIST Risk Management Framework (RMF)

Summary

9. Cloud Security for the IoT

Cloud services and the IoT

Asset/inventory management

Service provisioning, billing, and entitlement management

Real-time monitoring

Sensor coordination

Customer intelligence and marketing

Information sharing

Message transport/broadcast

Examining IoT threats from a cloud perspective

Exploring cloud service provider IoT offerings

AWS IoT

Microsoft Azure IoT suite

Cisco Fog Computing

IBM Watson IoT platform

MQTT and REST interfaces

Cloud IoT security controls

Authentication (and authorization)

Amazon AWS IAM

Azure authentication

Software/firmware updates

End-to-end security recommendations

Maintain data integrity

Secure bootstrap and enrollment of IoT devices

Security monitoring

Tailoring an enterprise IoT cloud security architecture

New directions in cloud-enabled IOT computing

IoT-enablers of the cloud

Software defined networking (SDN)

Data services

Container support for secure development environments

Containers for deployment support

Microservices

The move to 5G connectivity

Cloud-enabled directions

On-demand computing and the IoT (dynamic compute resources)

New distributed trust models for the cloud

Cognitive IoT

Summary

10. IoT Incident Response

Threats both to safety and security

Planning and executing an IoT incident response

Incident response planning

IoT system categorization

IoT incident response procedures

The cloud provider's role

IoT incident response team composition

Communication planning

Exercises and operationalizing an IRP in your organization

Detection and analysis

Analyzing the compromised system

Analyzing the IoT devices involved

Escalate and monitor

Containment, eradication, and recovery

Post-incident activities

Summary

Index

累计评论(0条) 0个书友正在讨论这本书 发表评论

发表评论

发表评论,分享你的想法吧!

买过这本书的人还买过

读了这本书的人还在读

回顶部