TY - BOOK AU - Adaros Boye,Carolina A. TI - Understanding cyberrisks in IoT: when smart things turn against you T2 - Business Expert Press Business law and corporate risk management collection, SN - 9781948976657 AV - TK5105 .U534 2019 PY - 2019/// CY - New York, New York (222 East 46th Street, New York, NY 10017) PB - Business Expert Press KW - Internet KW - Security measures KW - Internet of things KW - Management KW - Risk management KW - Privacy, Right of KW - IoT (Internet of things) KW - IIoT (Industrial Internet of things) KW - Cybersecurity KW - Risks KW - Industrial control systems KW - Cyberattack KW - Vulnerability KW - Threat KW - Availability KW - Integrity KW - Privacy KW - Confidentiality KW - Cyber-awareness KW - Electronic books N1 - 1 (pages 119-122) and index; Chapter 1. Introduction - What Is IoT? --; Chapter 2. Real attack cases - It is not science fiction, smart things can turn against you --; Chapter 3. Vulnerability assessments and hacking experiments - the risk is there, just waiting for a hacker with enough motivation --; Chapter 4. Why is IoT especially vulnerable? Requirements and challenges --; Chapter 5. IoT in an office environment - printers, smart TVs, routers, and uninvited guests --; Chapter 6. IoT in an industrial environment - industrial control systems and industry 4.0 --; Chapter 7. IoT in utilities and service monitoring - smart meters and other stuff --; Chapter 8. Typical types of attacks targeting IoT systems - understanding what can go wrong --; Chapter 9. Lessons learned - getting a better idea about how to handle the risks --; Chapter 10. Conclusions - now what do I do with this information?; 2; b; Also available in printing N2 - As much as companies have increased their awareness about cybersecurity, not all of them are taking effective measures to protect themselves and their customers. Many "smart" things or "IoT" devices get connected every year, allowing the creation of more efficient and even new products and services. However, this also brings new risks, considering also that these type of systems present additional challenges for applying cyber- security measures. This often leaves many doors open to malicious hackers! This book explains different ways how these systems get exposed to cyber-attacks in a friendly language using real cases as examples. Business professionals and nontechnical readers can benefit from this book by learning that cybersecurity is not an IT problem but an organizational prolem. As a leader and decision maker, having an under standing of IoT cyberrisks can help you to improve the preparedness of your organization to prevent and deal with cyberattacks. Overall this book is for everybody that wants to learn a little bit more about how cybersecurity is becoming more relevant in the connected world, both present and future UR - https://go.openathens.net/redirector/ciu.edu?url=https://portal.igpublish.com/iglibrary/search/BEPB0000890.html ER -