Adaros Boye, Carolina A.,

Understanding cyberrisks in IoT : when smart things turn against you / Carolina A. Adaros Boye. - First edition. - 1 online resource (vi, 128 pages) : color illustrations - Business Expert Press Business law and corporate risk management collection, 2333-6730 . - Business Expert Press Business law and corporate risk management collection. .



Chapter 1. Introduction - What Is IoT? -- Chapter 2. Real attack cases - It is not science fiction, smart things can turn against you -- Chapter 3. Vulnerability assessments and hacking experiments - the risk is there, just waiting for a hacker with enough motivation -- Chapter 4. Why is IoT especially vulnerable? Requirements and challenges -- Chapter 5. IoT in an office environment - printers, smart TVs, routers, and uninvited guests -- Chapter 6. IoT in an industrial environment - industrial control systems and industry 4.0 -- Chapter 7. IoT in utilities and service monitoring - smart meters and other stuff -- Chapter 8. Typical types of attacks targeting IoT systems - understanding what can go wrong -- Chapter 9. Lessons learned - getting a better idea about how to handle the risks -- Chapter 10. Conclusions - now what do I do with this information?

Access restricted to authorized users and institutions.

As much as companies have increased their awareness about cybersecurity, not all of them are taking effective measures to protect themselves and their customers. Many "smart" things or "IoT" devices get connected every year, allowing the creation of more efficient and even new products and services. However, this also brings new risks, considering also that these type of systems present additional challenges for applying cyber- security measures. This often leaves many doors open to malicious hackers! This book explains different ways how these systems get exposed to cyber-attacks in a friendly language using real cases as examples. Business professionals and nontechnical readers can benefit from this book by learning that cybersecurity is not an IT problem but an organizational prolem. As a leader and decision maker, having an under standing of IoT cyberrisks can help you to improve the preparedness of your organization to prevent and deal with cyberattacks. Overall this book is for everybody that wants to learn a little bit more about how cybersecurity is becoming more relevant in the connected world, both present and future.




Mode of access: World Wide Web.
System requirements: Adobe Acrobat reader.

9781948976657


Internet--Security measures.
Internet of things--Management.
Risk management.
Privacy, Right of.

IoT (Internet of things) IIoT (Industrial Internet of things) Cybersecurity. Risks. Industrial control systems. Cyberattack. Vulnerability. Threat. Availability. Integrity. Privacy. Confidentiality. Cyber-awareness.


[genre]
Electronic books.

TK5105.875.I57