000 04507nam a2200673 i 4500
001 9781948976657
003 BEP
005 20241023114913.0
006 m eo d
007 cr cn |||m|||a
008 190417s2019 nyua fob 001 0 eng d
020 _a9781948976657
_qe-book
035 _a(OCoLC)1106359617
035 _a(CaBNVSL)slc73515993
040 _aCaBNVSL
_beng
_erda
_cCaBNVSL
_dCaBNVSL
050 4 _aTK5105.875.I57
100 1 _aAdaros Boye, Carolina A.,
_eauthor.
245 1 0 _aUnderstanding cyberrisks in IoT :
_bwhen smart things turn against you /
_cCarolina A. Adaros Boye.
250 _aFirst edition.
264 1 _aNew York, New York (222 East 46th Street, New York, NY 10017) :
_bBusiness Expert Press,
_c[(c)2019.]
300 _a1 online resource (vi, 128 pages) :
_bcolor illustrations
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _adata file
_2rda
490 1 _aBusiness Expert Press Business law and corporate risk management collection,
_x2333-6730
504 _aIncludes bibliographical references (pages 119-122) and index.
505 0 _aChapter 1. Introduction - What Is IoT? --
_tChapter 2. Real attack cases - It is not science fiction, smart things can turn against you --
_tChapter 3. Vulnerability assessments and hacking experiments - the risk is there, just waiting for a hacker with enough motivation --
_tChapter 4. Why is IoT especially vulnerable? Requirements and challenges --
_tChapter 5. IoT in an office environment - printers, smart TVs, routers, and uninvited guests --
_tChapter 6. IoT in an industrial environment - industrial control systems and industry 4.0 --
_tChapter 7. IoT in utilities and service monitoring - smart meters and other stuff --
_tChapter 8. Typical types of attacks targeting IoT systems - understanding what can go wrong --
_tChapter 9. Lessons learned - getting a better idea about how to handle the risks --
_tChapter 10. Conclusions - now what do I do with this information?
506 _aAccess restricted to authorized users and institutions.
520 3 _aAs much as companies have increased their awareness about cybersecurity, not all of them are taking effective measures to protect themselves and their customers. Many "smart" things or "IoT" devices get connected every year, allowing the creation of more efficient and even new products and services. However, this also brings new risks, considering also that these type of systems present additional challenges for applying cyber- security measures. This often leaves many doors open to malicious hackers! This book explains different ways how these systems get exposed to cyber-attacks in a friendly language using real cases as examples. Business professionals and nontechnical readers can benefit from this book by learning that cybersecurity is not an IT problem but an organizational prolem. As a leader and decision maker, having an under standing of IoT cyberrisks can help you to improve the preparedness of your organization to prevent and deal with cyberattacks. Overall this book is for everybody that wants to learn a little bit more about how cybersecurity is becoming more relevant in the connected world, both present and future.
530 _a2
_ub
530 _aAlso available in printing.
538 _aMode of access: World Wide Web.
538 _aSystem requirements: Adobe Acrobat reader.
588 _aDescription based on PDF viewed 05/29/2019.
650 0 _aInternet
_xSecurity measures.
650 0 _aInternet of things
_xManagement.
650 0 _aRisk management.
650 0 _aPrivacy, Right of.
653 _aIoT (Internet of things)
653 _aIIoT (Industrial Internet of things)
653 _aCybersecurity.
653 _aRisks.
653 _aIndustrial control systems.
653 _aCyberattack.
653 _aVulnerability.
653 _aThreat.
653 _aAvailability.
653 _aIntegrity.
653 _aPrivacy.
653 _aConfidentiality.
653 _aCyber-awareness.
655 0 _a[genre]
655 0 _aElectronic books.
776 0 8 _iPrint version:
_z9781948976640
830 0 _aBusiness Expert Press Business law and corporate risk management collection.
_x2333-6730
856 4 0 _uhttps://go.openathens.net/redirector/ciu.edu?url=https://portal.igpublish.com/iglibrary/search/BEPB0000890.html
942 _2lcc
_bCIU
_cOB
_eBEP
_QOL
_zBEP9781948976657
999 _c74390
_d74390
902 _c1
_dCynthia Snell