Understanding cyberrisks in IoT : (Record no. 74390)

MARC details
000 -LEADER
fixed length control field 04507nam a2200673 i 4500
001 - CONTROL NUMBER
control field 9781948976657
003 - CONTROL NUMBER IDENTIFIER
control field BEP
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20241023114913.0
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS
fixed length control field m eo d
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr cn |||m|||a
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 190417s2019 nyua fob 001 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781948976657
Qualifying information
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)1106359617
035 ## - SYSTEM CONTROL NUMBER
System control number (CaBNVSL)slc73515993
040 ## - CATALOGING SOURCE
Original cataloging agency CaBNVSL
Language of cataloging eng
Description conventions rda
Transcribing agency CaBNVSL
Modifying agency CaBNVSL
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number TK5105.875.I57
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Adaros Boye, Carolina A.,
Relator term
245 10 - TITLE STATEMENT
Title Understanding cyberrisks in IoT :
Remainder of title when smart things turn against you /
Statement of responsibility, etc. Carolina A. Adaros Boye.
250 ## - EDITION STATEMENT
Edition statement First edition.
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture New York, New York (222 East 46th Street, New York, NY 10017) :
Name of producer, publisher, distributor, manufacturer Business Expert Press,
Date of production, publication, distribution, manufacture, or copyright notice [(c)2019.]
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource (vi, 128 pages) :
Other physical details color illustrations
336 ## - CONTENT TYPE
Content type term text
Content type code txt
Source rdacontent
337 ## - MEDIA TYPE
Media type term computer
Media type code c
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term online resource
Carrier type code cr
Source rdacarrier
347 ## - DIGITAL FILE CHARACTERISTICS
File type data file
Source rda
490 1# - SERIES STATEMENT
Series statement Business Expert Press Business law and corporate risk management collection,
ISBN 2333-6730
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Chapter 1. Introduction - What Is IoT? --
Title Chapter 2. Real attack cases - It is not science fiction, smart things can turn against you --
-- Chapter 3. Vulnerability assessments and hacking experiments - the risk is there, just waiting for a hacker with enough motivation --
-- Chapter 4. Why is IoT especially vulnerable? Requirements and challenges --
-- Chapter 5. IoT in an office environment - printers, smart TVs, routers, and uninvited guests --
-- Chapter 6. IoT in an industrial environment - industrial control systems and industry 4.0 --
-- Chapter 7. IoT in utilities and service monitoring - smart meters and other stuff --
-- Chapter 8. Typical types of attacks targeting IoT systems - understanding what can go wrong --
-- Chapter 9. Lessons learned - getting a better idea about how to handle the risks --
-- Chapter 10. Conclusions - now what do I do with this information?
506 ## - RESTRICTIONS ON ACCESS NOTE
Terms governing access Access restricted to authorized users and institutions.
520 3# - SUMMARY, ETC.
Summary, etc. As much as companies have increased their awareness about cybersecurity, not all of them are taking effective measures to protect themselves and their customers. Many "smart" things or "IoT" devices get connected every year, allowing the creation of more efficient and even new products and services. However, this also brings new risks, considering also that these type of systems present additional challenges for applying cyber- security measures. This often leaves many doors open to malicious hackers! This book explains different ways how these systems get exposed to cyber-attacks in a friendly language using real cases as examples. Business professionals and nontechnical readers can benefit from this book by learning that cybersecurity is not an IT problem but an organizational prolem. As a leader and decision maker, having an under standing of IoT cyberrisks can help you to improve the preparedness of your organization to prevent and deal with cyberattacks. Overall this book is for everybody that wants to learn a little bit more about how cybersecurity is becoming more relevant in the connected world, both present and future.
530 ## - COPYRIGHT INFORMATION:
COPYRIGHT INFORMATION COPYRIGHT NOT covered - Click this link to request copyright permission:
Uniform Resource Identifier <a href="b">b</a>
530 ## - COPYRIGHT INFORMATION:
COPYRIGHT INFORMATION
538 ## - SYSTEM DETAILS NOTE
System details note Mode of access: World Wide Web.
538 ## - SYSTEM DETAILS NOTE
System details note System requirements: Adobe Acrobat reader.
588 ## - SOURCE OF DESCRIPTION NOTE
Source of description note Description based on PDF viewed 05/29/2019.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Internet
General subdivision Security measures.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Internet of things
General subdivision Management.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Risk management.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Privacy, Right of.
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term IoT (Internet of things)
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term IIoT (Industrial Internet of things)
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term Cybersecurity.
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term Risks.
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term Industrial control systems.
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term Cyberattack.
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term Vulnerability.
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term Threat.
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term Availability.
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term Integrity.
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term Privacy.
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term Confidentiality.
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term Cyber-awareness.
655 #0 - INDEX TERM--GENRE/FORM
Genre/form data or focus term [genre]
655 #0 - INDEX TERM--GENRE/FORM
Genre/form data or focus term Electronic books.
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Relationship information Print version:
International Standard Book Number 9781948976640
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
Uniform title Business Expert Press Business law and corporate risk management collection.
International Standard Serial Number 2333-6730
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="https://go.openathens.net/redirector/ciu.edu?url=https://portal.igpublish.com/iglibrary/search/BEPB0000890.html">https://go.openathens.net/redirector/ciu.edu?url=https://portal.igpublish.com/iglibrary/search/BEPB0000890.html</a>
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Library of Congress Classification
Usage before 2021-2022 CIU
Koha item type Online Book (LOGIN USING YOUR MY CIU LOGIN AND PASSWORD)
VENDOR Business Expert Press
LOCATION ONLINE
Barecode BEP9781948976657
902 ## - LOCAL DATA ELEMENT B, LDB (RLIN)
c 1
d Cynthia Snell
Holdings
Withdrawn status Lost status Damaged status Not for loan Collection Home library Current library Shelving location Date acquired Source of acquisition Total Checkouts Full call number Barcode Date last seen Uniform Resource Identifier Price effective from Koha item type Source of classification or shelving scheme
        Non-fiction G. Allen Fleece Library G. Allen Fleece Library   03/20/2023 Business Expert Press   TK5105.875.I57 9781948976657 03/20/2023 https://go.openathens.net/redirector/ciu.edu?url=https://portal.igpublish.com/iglibrary/search/BEPB0000890.html 03/20/2023 Online Book (LOGIN USING YOUR MY CIU LOGIN AND PASSWORD)  
          G. Allen Fleece Library G. Allen Fleece Library ONLINE 10/23/2024 Business Expert Press   TK5105.875.I57 BEP9781948976657 10/23/2024 https://go.openathens.net/redirector/ciu.edu?url=https://portal.igpublish.com/iglibrary/search/BEPB0000890.html 10/23/2024 Online Book (LOGIN USING YOUR MY CIU LOGIN AND PASSWORD) Library of Congress Classification