
The IoT Architect's Guide to Attainable Security and Privacy
- 300 pages
- English
- ePUB (mobile friendly)
- Available on iOS & Android
The IoT Architect's Guide to Attainable Security and Privacy
About this book
This book describes how to architect and design Internet of Things (loT) solutions that provide end-to-end security and privacy at scale. It is unique in its detailed coverage of threat analysis, protocol analysis, secure design principles, intelligent loT's impact on privacy, and the effect of usability on security. The book also unveils the impact of digital currency and the dark web on the loT-security economy. It's both informative and entertaining.
"Filled with practical and relevant examples based on years of experience... with lively discussions and storytelling related to loT security design flaws and architectural issues."— Dr. James F. Ransome, Senior Director of Security Development Lifecycle (SOL) Engineering, Intel
'There is an absolute treasure trove of information within this book that will benefit anyone, not just the engineering community. This book has earned a permanent spot on my office bookshelf."— Erv Comer, Fellow of Engineering, Office of Chief Architect Zebra Technologies
'The importance of this work goes well beyond the engineer and architect. The IoT Architect's Guide to Attainable Security & Privacy is a crucial resource for every executive who delivers connected products to the market or uses connected products to run their business."— Kurt Lee, VP Sales and Strategic Alliances at PWNIE Express
"If we collectively fail to follow the advice described here regarding loT security and Privacy, we will continue to add to our mounting pile of exploitable computing devices. The attackers are having a field day. Read this book, now."— Brook S.E. Schoenfield, Director of Advisory Services at IOActive, previously Master Security Architect at McAfee, and author of Securing Systems
Frequently asked questions
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Information
Part One
Chapter 1
How We Got Here
— The discovery of new truths— Comfort and companionship— The rush of excitement— An increase in efficiency. . . humanity’s lure.
1.1 We Forgot Security When Building the Internet
1.2 What’s This Book About and Who’s It For?
1.3 Let’s Break Down the Book
- How We Got Here: In this chapter we introduce the Internet of Things, how it came about, why it exists, and its major components.
- The Castle and Its Many Gates: At this juncture, we begin to explore the inherent security concerns in IoT systems and the proper mindset of the security architect and engineer through the castle analogy. We use the castle analogy to discuss the attack surfaces of IoT systems.
- The IoT Security Economy: In this rather hair-raising trip into the dark side, we consider the regular economics of IoT and how cyber criminals subvert that economy to make money by compromising IoT systems. This leads us to consider the question, Why is security considered expensive for many IoT product companies?
- Architecting IoT Systems That Scale Securely: In this chapter, we take a deep dive into the various elements that make up an IoT system, such as the edge device, gateway, and cloud layers. We consider the constraints that are placed on IoT systems and finish up with an explanation of why security is hard in IoT systems.
- Security Architecture for Real IoT Systems: Securing any system requires careful analysis of the system, as well as of the attackers. This chapter reviews the processes and tools a security engineer uses to properly analyze and prepare an end-to-end IoT system to mitigate attacks and then walks through a threat-analysis exercise using an industrial factory example.
- Securing the IoT Cloud: Cloud computing represents a major attack surface for IoT solutions. As described earlier, cloud services process and make sense of inputs from IoT sensors and gateways. They also manage and provide instructions to gateways, sensors, and actuators. In this chapter, we use practical examples and illustrations to explore solutions to cloud security concerns that are particular to IoT use cases.
- Securely Connecting the Unconnected: IoT systems are nothing if they are not interconnected. We look at some of the most common communication protocols and discuss how to perform security analysis on protocols.
- Privacy, Pirates, and the Tale of a Smart City: This chapter takes a unique and captivating look at the digital privacy debate through the development of two realistic scenarios—one taking place in the present, and one in a smart city from the not-so-distant future.
- Privacy Controls in an Age of Ultra-Connectedness: The realities of privacy concerns in an ultra-connected world require workable strategies for designing and building privacy into IoT systems. Having looked at the evolving privacy challenges posed by the IoT, this chapter reviews the algorithms and software techniques used to preserve privacy. This chapter provides a balanced perspective of definitions, policies, legal protections, and controls.
- Security Usability: Human, Computer, and Security Interaction: An IoT system has many pieces, all of which must be securely managed. It isn’t enough to design security into a system; the administration of the system must also be done securely. What happens when an IoT system’s security features are too convoluted or unintuitive? History shows that system owners bypass or ignore them. How can we design secure access, network protections, and security administration features into IoT systems so that those systems are actually usable?
Table of contents
- Cover
- Half Title
- Title Page
- Copyright Page
- Dedication
- Table of Contents
- Foreword
- Foreword
- Preface
- Acknowledgments
- About the Authors
- Part One
- Part Two
- Part Three
- Epilogue
- Index