Demystifying Internet of Things Security

Successful IoT Device/Edge and Platform Security Deployment


Demystifying Internet of Things Security
Demystifying Internet of Things Security
CC BY

Book Details

Authors Sunil Cheruvu, Anil Kumar, Ned Smith, David M. Wheeler
Publisher Apress
Published 2020
Edition 1st
Paperback 488 pages
Language English
ISBN-13 9781484228951, 9781484228968
ISBN-10 1484228952, 1484228960
License Creative Commons Attribution

Book Description

Break down the misconceptions of the Internet of Things by examining the different security building blocks available in Intel Architecture (IA) based IoT platforms. This book reviews the threat pyramid, secure boot, chain of trust, and the SW stack leading up to defense-in-depth.
The IoT presents unique challenges in implementing security and Intel has both CPU and Isolated Security Engine capabilities to simplify it. This book explores the challenges to secure these devices to make them immune to different threats originating from within and outside the network. The requirements and robustness rules to protect the assets vary greatly and there is no single blanket solution approach to implement security.

Demystifying Internet of Things Security provides clarity to industry professionals and provides and overview of different security solutions

What You'll Learn: Secure devices, immunizing them against different threats originating from inside and outside the network; Gather an overview of the different security building blocks available in Intel Architecture (IA) based IoT platforms; Understand the threat pyramid, secure boot, chain of trust, and the software stack leading up to defense-in-depth.

Who This Book Is For: Strategists, developers, architects, and managers in the embedded and Internet of Things (IoT) space trying to understand and implement the security in the IoT devices/platforms.


This book is available under a Creative Commons Attribution license (CC BY), which means that you are free to copy, distribute, and modify it, as long as you give appropriate credit to the original author.

If you enjoyed the book and would like to support the author, you can purchase a printed copy (hardcover or paperback) from official retailers.

Download and Read Links

Share this Book

[localhost]# find . -name "*Similar_Books*"


Security Risk Management for the Internet of Things

IoT

In recent years, the rising complexity of Internet of Things (IoT) systems has increased their potential vulnerabilities and introduced new cybersecurity challenges. In this context, state of the art methods and technologies for security risk assessment have prominent limitations when it comes to large scale, cyber-physical and interconnected IoT s

Internet of Things For Dummies, 2nd Edition

IoT

The Internet of Things (IoT) is creating a new world - a quantifiable and measurable world - in which people can better manage their lives, cities can better manage their infrastructure, and companies can better manage their businesses. This new smart connected world will offer fundamental changes to consumers and to society, and it will profoundly

Managing Risk and Information Security

Security

Managing Risk and Information Security: Protect to Enable, describes the changing risk environment and why a fresh approach to information security is needed. Because almost every aspect of an enterprise is now dependent on technology, the focus of IT security must shift from locking down assets to enabling the business while managing and surviving

Managing Risk and Information Security, 2nd Edition

Security

Examine the evolving enterprise security landscape and discover how to manage and survive risk. While based primarily on the author's experience and insights at major companies where he has served as CISO and CSPO, the book also includes many examples from other well-known companies and provides guidance for a management-level audience. Managing Ri

Intel Galileo and Intel Galileo Gen 2

Arduino Linux Assembler C / C++ Java

Intel Galileo and Intel Galileo Gen 2: API Features and Arduino Projects for Linux Programmers provides detailed information about Intel Galileo and Intel Galileo Gen 2 boards for all software developers interested in Arduino and the Linux platform. The book covers the new Arduino APIs and is an introduction for developers on natively using Linux.

Rhetorical Code Studies

Software developers work rhetorically to make meaning through the code they write. In some ways, writing code is like any other form of communication; in others, it proves to be new, exciting, and unique. In Rhetorical Code Studies, Kevin Brock explores how software code serves as meaningful communication through which software developers construct