Nothing Special   »   [go: up one dir, main page]

Dhondge, 2021 - Google Patents

Lifecycle IoT Security for Engineers

Dhondge, 2021

Document ID
15667844637162046169
Author
Dhondge K
Publication year

External Links

Snippet

This comprehensive resource provides a thorough introduction to the security risks, attack vectors and vulnerabilities an Internet of things (IoT) product and its network can face at different phases of its lifecycle. The risks at each stage of the development and operations …
Continue reading at books.google.com (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/145Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security

Similar Documents

Publication Publication Date Title
US11722521B2 (en) Application firewall
Ogonji et al. A survey on privacy and security of Internet of Things
Shafiq et al. The Rise of “Internet of Things”: Review and Open Research Issues Related to Detection and Prevention of IoT‐Based Security Attacks
Jurcut et al. Security considerations for Internet of Things: A survey
Miloslavskaya et al. Internet of Things: information security challenges and solutions
Borky et al. Protecting information with cybersecurity
Anisetti et al. Security threat landscape
Russell IoT cyber security
Brooks et al. Conceptualizing a secure wireless cloud
Dhondge Lifecycle IoT Security for Engineers
Rocha Cybersecurity analysis of a SCADA system under current standards, client requisites, and penetration testing
Kujo Implementing Zero Trust Architecture for Identities and Endpoints with Microsoft tools
GB2572471A (en) Detecting lateral movement by malicious applications
Tanque et al. Cyber risks on IoT platforms and zero trust solutions
Brooks CLOUD TO EDGEWARE: Wireless Grid Applications, Architecture and Security for the Internet of Things
US20240146536A1 (en) Network access using hardware-based security
Makhdoom Defense against integrity and privacy attacks in the Internet of Things
Thomas et al. IoT Security: Challenges, Best Practices, and Service Platforms
Veshne Attack Surface Management: Principles for simplifying the complexity of OT security
Waizenegger Data security in multi-tenant environments in the cloud
Svensk Mobile Device Security: Exploring the Possibilities and Limitations with Bring Your Own Device (BYOD)
Udayakumar Get Started with Azure Security
Chan Ramifications of Security in IoT Devices
Danyeko et al. IoT Vulnerabilities
Milenkovic et al. Chapter 5: Security and Management