logo
logo
x
바코드검색
BOOKPRICE.co.kr
책, 도서 가격비교 사이트
바코드검색

인기 검색어

실시간 검색어

검색가능 서점

도서목록 제공

Iot Security Issues

Iot Security Issues (Paperback)

알라스데어 길크리스트 (지은이)
de/G Press
97,280원

일반도서

검색중
서점 할인가 할인률 배송비 혜택/추가 실질최저가 구매하기
79,760원 -18% 0원
3,990원
75,770원 >
yes24 로딩중
교보문고 로딩중
notice_icon 검색 결과 내에 다른 책이 포함되어 있을 수 있습니다.

중고도서

검색중
서점 유형 등록개수 최저가 구매하기
로딩중

eBook

검색중
서점 정가 할인가 마일리지 실질최저가 구매하기
로딩중

책 이미지

Iot Security Issues
eBook 미리보기

책 정보

· 제목 : Iot Security Issues (Paperback) 
· 분류 : 외국도서 > 컴퓨터 > 인터넷 > 보안
· ISBN : 9781501514746
· 쪽수 : 273쪽
· 출판일 : 2017-01-23

목차

Introduction | 1

Part I: Making Sense of the Hype

Chapter 1 - The Consumer Internet of Things | 5

A Wave of Technology, or a Wave of Hype | 5

IoT Skeptics and the Role of Security Issues | 6

The Internet of No-thing | 7

Where are these IoT devices? | 8

Why the ambiguity in IoT uptake? | 9

The Media and Marketing Hype | 9

Lack of Killer Applications | 11

There be Monsters | 11

Buying Secure IoT Devices? | 12

Making Things That Just Work | 16

Is this a consumer Internet of things? | 16

Skepticism, but the future looks bright | 17

Consumer Trust - or Lack of It | 19

Losing Control? | 19

Toys for the Rich | 21

IoT isn't DIY | 22

Is Security a Major Inhibitor? | 23

Part II: Security

Chapter 2 - It's Not Just About the Future | 27

Looking back to move forward | 27

Security by Design | 29

Data Mobile Networks | 30

A Confluence of New Technologies | 32

Basic Security Practices | 34

Chapter 3 - Flawed, Insecure Devices | 35

Why are so many insecure devices on the market? | 35

A Manufacturer's Perspective | 35

The Device Production Cycle | 36

Software development in an agile market | 37

Clash of Cultures | 37

Developers and the Security Puzzle | 38

Reputational loss | 40

Chapter 4 - Securing the Unidentified | 43

The Scale of the Problem | 44

What Type of Devices to Secure? | 44

Unplanned Change | 44

The Consumer's View on Security | 45

Chapter 5 - Consumer Convenience Trumps Security | 49

Plug n' Pray | 49

Easy install - no truck rolls | 51

Convenient but insecure | 51

Many home networks are insecure? | 53

Customer Ignorance | 53

Chapter 6 - Startups Driving the IoT | 55

Installing IoT Devices | 56

Security knowledge is lacking | 56

Chapter 7 - Cyber-Security and the Customer Experience | 57

Pushing Security onto the Consumer | 58

Industry regulations and standards - where are they? | 58

The home ecosystem | 59

Security negativity | 60

Security Anomalies | 61

What device can be trusted | 61

Chapter 8 - Security Requirements for the IoT | 65

Why security issues arise | 65

Security and product confidence | 66

Me-too manufacturing | 66

Cutting development costs | 67

Security is not an extra | 67

Loss of product trust | 68

Designing appropriate security | 69

Chapter 9 - Re-engineering the IoT | 71

Comparing Apples and Oranges | 73

The Bluetooth lock saga | 74

Device vulnerabilities and flaws | 75

Flawed firmware | 76

Code re-use | 76

The issue with open source | 77

Chapter 10 - IoT Production, Security and Strength | 79

Manufacturing IoT Devices | 80

ODM design | 81

The tale of the Wi-Fi Kettle | 83

Push Vs. pull marketing | 83

Chapter 11 - Wearable's - A New Developer's Headache | 85

IoT by stealth | 87

The consumer IoT conundrum | 90

Designing in Vulnerabilities | 91

Passwords are the problem | 93

Why are cookies important? | 94

Chapter 12 - New Surface Threats | 97

Hacking IoT Firmware | 97

Part III: Architecting the Secure IoT

Chapter 13 - Designing the Secure IoT | 107

IoT from an Architect's View-Point | 109

Modeling the IoT | 109

IoT communication patterns | 111

First IoT design principles | 113

Chapter 14 - Secure IoT Architecture Patterns | 117

Event and data processing | 118

Chapter 15 - Threat Models | 121

What are threat models? | 121

Designing a threat model | 122

6 steps to threat modeling | 122

Advanced IoT threats | 124

Devices | 124

Networks | 125

Infrastructure | 127

Interfaces | 127

Part IV: Defending the IoT

Chapter 16 - Threats, Vulnerabilities and Risks | 131

IoT threats & counter-measures | 131

Chapter 17 - IoT Security Framework | 135

Introduction to the IoT security framework | 135

Chapter 18 - Secure IoT Design | 141

IoT Network Design | 145

IoT protocols | 148

The IoT Stack | 149

Link layer | 150

Adaption layer | 152

IPv6 & IPsec | 154

Routing | 154

Messaging | 157

Chapter 19 - Utilizing IPv6 Security Features | 159

Securing the IoT | 162

Confidentiality | 162

Integrity | 162

Availability | 163

Link layer | 164

Network layer | 164

Transport layer | 165

Network security | 165

Part V: Trust

Chapter 20 - The IoT of Trust | 169

Trust between partners - there isn't that much about | 170

IBM Vs. Microsoft | 171

Apple vs. Samsung | 171

Uber Vs Crowdsources drivers | 172

Manufacturer and customer trust model | 172

Dubious toys | 173

Kids play | 174

Chapter 21 - It's All About the Data | 175

Appropriating data | 176

The Data Appropriators | 177

Where is the fair barter? | 178

Trust by design | 179

Chapter 22 - Trusting the Device | 185

Hacking voicemail | 188

Unethical phone hacking | 189

Chapter 23 - Who Can We Trust? | 191

Free is an Earner | 193

Pissing into the Tent | 193

IoT Trust is Essential | 194

The Osram debacle | 194

LIFX's another Hack? | 195

Balancing Security and Trust | 196

So, Who Can We Trust? | 196

Open Trust Alliance | 197

Part VI: Privacy

Chapter 24 - Personal Private Information (PIP) | 201

Why is the Privacy of our Personal Information Important? | 201

Collecting Private Data | 204

Data is the New Oil, or Is It? | 204

Attacks on data privacy at Internet scale | 205

Young and Carefree | 206

Can we Control our Privacy? | 207

Ad-blockers - They're Not What They Seem | 207

Google and the dubious ad blockers | 208

Privacy Laws Around the Globe | 208

United States of America | 209

Germany | 210

Russia | 211

China | 211

India | 212

Brazil | 212

Australia | 213

Japan | 213

UK (Under review) | 213

Different Laws in Countries - What Possibly Could Go Wrong | 214

Facebook's EU Opt-out Scandal | 214

Chapter 25 - The U.S. and EU Data Privacy Shield | 217

When privacy laws collide | 219

Losing a Safe Harbor | 219

After the closure of the Safe Harbor | 220

Model and Standard Contractual Clauses | 220

The new EU - US Privacy Shield | 220

New shield or old failings | 221

Contradictions on privacy | 222

Leveraging the value of data | 224

Part VII: Surveillance, Subterfuge and Sabotage

Chapter 26 - The Panopticon | 229

The good, the bad and the ugly | 229

Home surveillance | 229

Law enforcement - going dark | 231

Dragnet Exploits | 233

The 5-Eyes (FVEY) | 235

PRISM | 237

Mastering the Internet | 241

Project TEMPORA | 241

XKEYSTORE | 243

Windstop | 244

MUSCULAR | 244

INCENSER | 246

Encryption in the IoT | 249

The Snooper's charter | 251

Nothing to hide nothing to fear | 254

Its only metadata | 255

Index | 257

저자소개

알라스데어 길크리스트 (지은이)    정보 더보기
전문 기술자, 매니저 및 IT와 데이터 통신과 모바일 텔레콤의 현장 감독으로 경력을 쌓았다. 기술적인 관점에서뿐만 아니라 우수한 비즈니스 관행, 전략, 거버넌스 및 규정 준수에 이르기까지 독자들과 공감할 수 있는 능력을 갖추고 있다. 전문 지식이 가치 있다고 느끼는 사업이나 기술 분야의 기사나 책을 쓰는 것을 좋아한다. 태국에 기반을 둔 프리랜서 컨설턴트이자 기술 작가다.
펼치기
이 포스팅은 쿠팡 파트너스 활동의 일환으로,
이에 따른 일정액의 수수료를 제공받습니다.
이 포스팅은 제휴마케팅이 포함된 광고로 커미션을 지급 받습니다.
도서 DB 제공 : 알라딘 서점(www.aladin.co.kr)
최근 본 책