3Vulnerability Assessment Tools for IoT: An Agile Approach

Pooja Anand* and Yashwant Singh

Department of Computer Science and Information Technology, Central University of Jammu, Jammu and Kashmir, India

Abstract

Smart services being more high-handed than ever before increased the security contemplations which faded with growing divergence in threat variants and IoT devices. To adapt with increasing IoT vulnerabilities and thus, multiplying cyber threats, security professionals need to actively work with software developers to develop more secure smart systems. Thus, to ensure long time secure systems, agile methods must be adopted to develop software projects dealing with growing vulnerabilities and threat implications. This adoption is necessary because agile methods are iterative in nature and facilitate service/product delivery in smaller batches allowing developers to add security activities pertaining software development via agile methodologies. Moreover, the reiterative aspect of this approach encourages the expansion of software that can very well cope up with growing threat variants and vulnerabilities. Thus, frequent inspections and patching in IoT firmware’s/software’s reduces cybersecurity risks and vulnerabilities. Motivated by the facts, this work centers around the detection of growing threat variants and vulnerabilities by applying the efficacy of agile techniques.

Keywords: IoT, vulnerabilities, tools, agile, software, applications

3.1 Introduction

Internet ...

Get Agile Software Development now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.