Dhondge, 2021 - Google Patents
Lifecycle IoT Security for EngineersDhondge, 2021
- Document ID
- 15667844637162046169
- Author
- Dhondge K
- Publication year
External Links
Snippet
This comprehensive resource provides a thorough introduction to the security risks, attack vectors and vulnerabilities an Internet of things (IoT) product and its network can face at different phases of its lifecycle. The risks at each stage of the development and operations …
- 238000000034 method 0 abstract description 45
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/145—Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11722521B2 (en) | Application firewall | |
Ogonji et al. | A survey on privacy and security of Internet of Things | |
Shafiq et al. | The Rise of “Internet of Things”: Review and Open Research Issues Related to Detection and Prevention of IoT‐Based Security Attacks | |
Jurcut et al. | Security considerations for Internet of Things: A survey | |
Miloslavskaya et al. | Internet of Things: information security challenges and solutions | |
Borky et al. | Protecting information with cybersecurity | |
Anisetti et al. | Security threat landscape | |
Russell | IoT cyber security | |
Brooks et al. | Conceptualizing a secure wireless cloud | |
Dhondge | Lifecycle IoT Security for Engineers | |
Rocha | Cybersecurity analysis of a SCADA system under current standards, client requisites, and penetration testing | |
Kujo | Implementing Zero Trust Architecture for Identities and Endpoints with Microsoft tools | |
GB2572471A (en) | Detecting lateral movement by malicious applications | |
Tanque et al. | Cyber risks on IoT platforms and zero trust solutions | |
Brooks | CLOUD TO EDGEWARE: Wireless Grid Applications, Architecture and Security for the Internet of Things | |
US20240146536A1 (en) | Network access using hardware-based security | |
Makhdoom | Defense against integrity and privacy attacks in the Internet of Things | |
Thomas et al. | IoT Security: Challenges, Best Practices, and Service Platforms | |
Veshne | Attack Surface Management: Principles for simplifying the complexity of OT security | |
Waizenegger | Data security in multi-tenant environments in the cloud | |
Svensk | Mobile Device Security: Exploring the Possibilities and Limitations with Bring Your Own Device (BYOD) | |
Udayakumar | Get Started with Azure Security | |
Chan | Ramifications of Security in IoT Devices | |
Danyeko et al. | IoT Vulnerabilities | |
Milenkovic et al. | Chapter 5: Security and Management |