3Vulnerability Assessment Tools for IoT: An Agile Approach
Pooja Anand* and Yashwant Singh
Department of Computer Science and Information Technology, Central University of Jammu, Jammu and Kashmir, India
Abstract
Smart services being more high-handed than ever before increased the security contemplations which faded with growing divergence in threat variants and IoT devices. To adapt with increasing IoT vulnerabilities and thus, multiplying cyber threats, security professionals need to actively work with software developers to develop more secure smart systems. Thus, to ensure long time secure systems, agile methods must be adopted to develop software projects dealing with growing vulnerabilities and threat implications. This adoption is necessary because agile methods are iterative in nature and facilitate service/product delivery in smaller batches allowing developers to add security activities pertaining software development via agile methodologies. Moreover, the reiterative aspect of this approach encourages the expansion of software that can very well cope up with growing threat variants and vulnerabilities. Thus, frequent inspections and patching in IoT firmware’s/software’s reduces cybersecurity risks and vulnerabilities. Motivated by the facts, this work centers around the detection of growing threat variants and vulnerabilities by applying the efficacy of agile techniques.
Keywords: IoT, vulnerabilities, tools, agile, software, applications
3.1 Introduction
Internet ...
Get Agile Software Development now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.