Amazon cover image
Image from Amazon.com

Understanding cyberrisks in IoT : when smart things turn against you / Carolina A. Adaros Boye.

By: Material type: TextTextSeries: Publication details: New York, New York (222 East 46th Street, New York, NY 10017) : Business Expert Press, (c)2019.Edition: First editionDescription: 1 online resource (vi, 128 pages) : color illustrationsContent type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9781948976657
Subject(s): Genre/Form: LOC classification:
  • TK5105 .U534 2019
Online resources: Available additional physical forms:
Contents:
Chapter 2. Real attack cases - It is not science fiction, smart things can turn against you -- Chapter 3. Vulnerability assessments and hacking experiments - the risk is there, just waiting for a hacker with enough motivation -- Chapter 4. Why is IoT especially vulnerable? Requirements and challenges -- Chapter 5. IoT in an office environment - printers, smart TVs, routers, and uninvited guests -- Chapter 6. IoT in an industrial environment - industrial control systems and industry 4.0 -- Chapter 7. IoT in utilities and service monitoring - smart meters and other stuff -- Chapter 8. Typical types of attacks targeting IoT systems - understanding what can go wrong -- Chapter 9. Lessons learned - getting a better idea about how to handle the risks -- Chapter 10. Conclusions - now what do I do with this information?
Abstract: As much as companies have increased their awareness about cybersecurity, not all of them are taking effective measures to protect themselves and their customers. Many "smart" things or "IoT" devices get connected every year, allowing the creation of more efficient and even new products and services. However, this also brings new risks, considering also that these type of systems present additional challenges for applying cyber- security measures. This often leaves many doors open to malicious hackers! This book explains different ways how these systems get exposed to cyber-attacks in a friendly language using real cases as examples. Business professionals and nontechnical readers can benefit from this book by learning that cybersecurity is not an IT problem but an organizational prolem. As a leader and decision maker, having an under standing of IoT cyberrisks can help you to improve the preparedness of your organization to prevent and deal with cyberattacks. Overall this book is for everybody that wants to learn a little bit more about how cybersecurity is becoming more relevant in the connected world, both present and future.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)

Chapter 1. Introduction - What Is IoT? -- Chapter 2. Real attack cases - It is not science fiction, smart things can turn against you -- Chapter 3. Vulnerability assessments and hacking experiments - the risk is there, just waiting for a hacker with enough motivation -- Chapter 4. Why is IoT especially vulnerable? Requirements and challenges -- Chapter 5. IoT in an office environment - printers, smart TVs, routers, and uninvited guests -- Chapter 6. IoT in an industrial environment - industrial control systems and industry 4.0 -- Chapter 7. IoT in utilities and service monitoring - smart meters and other stuff -- Chapter 8. Typical types of attacks targeting IoT systems - understanding what can go wrong -- Chapter 9. Lessons learned - getting a better idea about how to handle the risks -- Chapter 10. Conclusions - now what do I do with this information?

As much as companies have increased their awareness about cybersecurity, not all of them are taking effective measures to protect themselves and their customers. Many "smart" things or "IoT" devices get connected every year, allowing the creation of more efficient and even new products and services. However, this also brings new risks, considering also that these type of systems present additional challenges for applying cyber- security measures. This often leaves many doors open to malicious hackers! This book explains different ways how these systems get exposed to cyber-attacks in a friendly language using real cases as examples. Business professionals and nontechnical readers can benefit from this book by learning that cybersecurity is not an IT problem but an organizational prolem. As a leader and decision maker, having an under standing of IoT cyberrisks can help you to improve the preparedness of your organization to prevent and deal with cyberattacks. Overall this book is for everybody that wants to learn a little bit more about how cybersecurity is becoming more relevant in the connected world, both present and future.

COPYRIGHT NOT covered - Click this link to request copyright permission:

https://lib.ciu.edu/copyright-request-form

Mode of access: World Wide Web.

System requirements: Adobe Acrobat reader.

Description based on PDF viewed 05/29/2019.

There are no comments on this title.

to post a comment.