000 | 04507nam a2200673 i 4500 | ||
---|---|---|---|
001 | 9781948976657 | ||
003 | BEP | ||
005 | 20241023114913.0 | ||
006 | m eo d | ||
007 | cr cn |||m|||a | ||
008 | 190417s2019 nyua fob 001 0 eng d | ||
020 |
_a9781948976657 _qe-book |
||
035 | _a(OCoLC)1106359617 | ||
035 | _a(CaBNVSL)slc73515993 | ||
040 |
_aCaBNVSL _beng _erda _cCaBNVSL _dCaBNVSL |
||
050 | 4 | _aTK5105.875.I57 | |
100 | 1 |
_aAdaros Boye, Carolina A., _eauthor. |
|
245 | 1 | 0 |
_aUnderstanding cyberrisks in IoT : _bwhen smart things turn against you / _cCarolina A. Adaros Boye. |
250 | _aFirst edition. | ||
264 | 1 |
_aNew York, New York (222 East 46th Street, New York, NY 10017) : _bBusiness Expert Press, _c[(c)2019.] |
|
300 |
_a1 online resource (vi, 128 pages) : _bcolor illustrations |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_adata file _2rda |
||
490 | 1 |
_aBusiness Expert Press Business law and corporate risk management collection, _x2333-6730 |
|
504 | _aIncludes bibliographical references (pages 119-122) and index. | ||
505 | 0 |
_aChapter 1. Introduction - What Is IoT? -- _tChapter 2. Real attack cases - It is not science fiction, smart things can turn against you -- _tChapter 3. Vulnerability assessments and hacking experiments - the risk is there, just waiting for a hacker with enough motivation -- _tChapter 4. Why is IoT especially vulnerable? Requirements and challenges -- _tChapter 5. IoT in an office environment - printers, smart TVs, routers, and uninvited guests -- _tChapter 6. IoT in an industrial environment - industrial control systems and industry 4.0 -- _tChapter 7. IoT in utilities and service monitoring - smart meters and other stuff -- _tChapter 8. Typical types of attacks targeting IoT systems - understanding what can go wrong -- _tChapter 9. Lessons learned - getting a better idea about how to handle the risks -- _tChapter 10. Conclusions - now what do I do with this information? |
|
506 | _aAccess restricted to authorized users and institutions. | ||
520 | 3 | _aAs much as companies have increased their awareness about cybersecurity, not all of them are taking effective measures to protect themselves and their customers. Many "smart" things or "IoT" devices get connected every year, allowing the creation of more efficient and even new products and services. However, this also brings new risks, considering also that these type of systems present additional challenges for applying cyber- security measures. This often leaves many doors open to malicious hackers! This book explains different ways how these systems get exposed to cyber-attacks in a friendly language using real cases as examples. Business professionals and nontechnical readers can benefit from this book by learning that cybersecurity is not an IT problem but an organizational prolem. As a leader and decision maker, having an under standing of IoT cyberrisks can help you to improve the preparedness of your organization to prevent and deal with cyberattacks. Overall this book is for everybody that wants to learn a little bit more about how cybersecurity is becoming more relevant in the connected world, both present and future. | |
530 |
_a2 _ub |
||
530 | _aAlso available in printing. | ||
538 | _aMode of access: World Wide Web. | ||
538 | _aSystem requirements: Adobe Acrobat reader. | ||
588 | _aDescription based on PDF viewed 05/29/2019. | ||
650 | 0 |
_aInternet _xSecurity measures. |
|
650 | 0 |
_aInternet of things _xManagement. |
|
650 | 0 | _aRisk management. | |
650 | 0 | _aPrivacy, Right of. | |
653 | _aIoT (Internet of things) | ||
653 | _aIIoT (Industrial Internet of things) | ||
653 | _aCybersecurity. | ||
653 | _aRisks. | ||
653 | _aIndustrial control systems. | ||
653 | _aCyberattack. | ||
653 | _aVulnerability. | ||
653 | _aThreat. | ||
653 | _aAvailability. | ||
653 | _aIntegrity. | ||
653 | _aPrivacy. | ||
653 | _aConfidentiality. | ||
653 | _aCyber-awareness. | ||
655 | 0 | _a[genre] | |
655 | 0 | _aElectronic books. | |
776 | 0 | 8 |
_iPrint version: _z9781948976640 |
830 | 0 |
_aBusiness Expert Press Business law and corporate risk management collection. _x2333-6730 |
|
856 | 4 | 0 | _uhttps://go.openathens.net/redirector/ciu.edu?url=https://portal.igpublish.com/iglibrary/search/BEPB0000890.html |
942 |
_2lcc _bCIU _cOB _eBEP _QOL _zBEP9781948976657 |
||
999 |
_c74390 _d74390 |
||
902 |
_c1 _dCynthia Snell |