000 02939cam a2200325Ii 4500
001 on1286429132
003 OCoLC
005 20240726104845.0
008 211127s2021 xx o 000 0 eng d
040 _aEBLCP
_beng
_erda
_epn
_cEBLCP
_dIEEEE
_dNT
020 _a9781630818043
_q((electronic)l(electronic)ctronic)
050 0 4 _aTK5105
_b.L544 2021
049 _aMAIN
100 1 _aDhondge, Kaustubh,
_e1
245 1 0 _aLifecycle IoT security for engineers /Kaustubh Dhondge.
300 _a1 online resource (219 pages)
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _adata file
_2rda
504 _a2
520 0 _aThis comprehensive resource provides a thorough introduction to the security risks, attack vectors and vulnerabilities an Internet of things (IoT) product and its network can face at different phases of its lifecycle. The risks at each stage of the development and operations (DevOps) lifecycle of an IoT product are analyzed. Examples of recent, relevant security threats faced by the industry are discussed and why the security breach happened, how it was resolved, and what could have been done to avoid them will be explained. Readers will learn the best practices to secure their IoT products, and networks in a holistic way.   IoT and the diverse and unique nature of IoT applications across the commercial and industrial landscape, are introduced, including the need for securing IoT. The lifecycle of IoT security, specifically the security implementations that need to be carried out at various stages in the operational process of an IoT service are presented, as well as the security requirements during the planning, security integration, operational, maintenance, and planned discontinuation phase of an IoT service. The vulnerabilities in IoT, the various attack vectors exploited by attackers, and preventive measures that can be undertaken to avoid these security attacks are also explored.   Readers are acclimated with various steps that must be undertaken to prepare for IoT security attacks, and techniques that can be employed to detect them. Key challenges involved with implementing appropriate levels of security in IoT due to heterogeneity, interoperability, human errors, and commercial factors are discussed, as well as the need for regulatory guidance for the IoT industry and highlights specific examples of regulations in leading markets across the globe.
530 _a2
_ub
650 0 _aInternet of things
_xSecurity measures.
655 1 _aElectronic Books.
856 4 0 _zClick to access digital title | log in using your CIU ID number and my.ciu.edu password.
_uhttpss://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=3099627&site=eds-live&custid=s3260518
942 _cOB
_D
_eEB
_hTK.
_m2021
_QOL
_R
_x
_8NFIC
_2LOC
994 _a92
_bNT
999 _c80690
_d80690
902 _a1
_bCynthia Snell
_c1
_dCynthia Snell