Book description
IoT Security Issues looks at the burgeoning growth of devices of all kinds controlled over the Internet of all varieties, where product comes first and security second. In this case, security trails badly. This book examines the issues surrounding these problems, vulnerabilities, what can be done to solve the problem, investigating the stack for the roots of the problems and how programming and attention to good security practice can combat the problems today that are a result of lax security processes on the Internet of Things.
This book is for people interested in understanding the vulnerabilities on the Internet of Things, such as programmers who have not yet been focusing on the IoT, security professionals and a wide array of interested hackers and makers. This book assumes little experience or knowledge of the Internet of Things. To fully appreciate the book, limited programming background would be helpful for some of the chapters later in the book, though the basic content is explained.
The author, Alasdair Gilchrist, has spent 25 years as a company director in the fields of IT, Data Communications, Mobile Telecoms and latterly Cloud/SDN/NFV technologies, as a professional technician, support manager, network and security architect. He has project-managed both agile SDLC software development as well as technical network architecture design. He has experience in the deployment and integration of systems in enterprise, cloud, fixed/mobile telecoms, and service provider networks. He is therefore knowledgeable in a wide range of technologies and has written a number of books in related fields.
Table of contents
- Cover
- Title
- Copyright
- Acknowledgements
- Table of Contents
- Introduction
-
Part I: Making Sense of the Hype
-
Chapter 1 – The Consumer Internet of Things
- A Wave of Technology, or a Wave of Hype
- IoT Skeptics and the Role of Security Issues
- The Internet of No-thing
- Where are these IoT devices?
- Why the ambiguity in IoT uptake?
- The Media and Marketing Hype
- Lack of Killer Applications
- There be Monsters
- Buying Secure IoT Devices?
- Making Things That Just Work
- Is this a consumer Internet of things?
- Skepticism, but the future looks bright
- Consumer Trust – or Lack of It
- Losing Control?
- Toys for the Rich
- IoT isn’t DIY
- Is Security a Major Inhibitor?
-
Chapter 1 – The Consumer Internet of Things
-
Part II: Security
- Chapter 2 – It’s Not Just About the Future
- Chapter 3 – Flawed, Insecure Devices
- Chapter 4 – Securing the Unidentified
- Chapter 5 – Consumer Convenience Trumps Security
- Chapter 6 – Startups Driving the IoT
- Chapter 7 – Cyber-Security and the Customer Experience
- Chapter 8 – Security Requirements for the IoT
- Chapter 9 – Re-engineering the IoT
- Chapter 10 – IoT Production, Security and Strength
- Chapter 11 – Wearable’s – A New Developer’s Headache
- Chapter 12 – New Surface Threats
- Part III: Architecting the Secure IoT
- Part IV: Defending the IoT
- Part V: Trust
-
Part VI: Privacy
-
Chapter 24 – Personal Private Information (PIP)
- Why is the Privacy of our Personal Information Important?
- Collecting Private Data
- Data is the New Oil, or Is It?
- Attacks on data privacy at Internet scale
- Young and Carefree
- Can we Control our Privacy?
- Ad-blockers – They’re Not What They Seem
- Google and the dubious ad blockers
- Privacy Laws Around the Globe
- Different Laws in Countries – What Possibly Could Go Wrong
- Chapter 25 – The U.S. and EU Data Privacy Shield
-
Chapter 24 – Personal Private Information (PIP)
- Part VII: Surveillance, Subterfuge and Sabotage
- Index
Product information
- Title: IoT Security Issues
- Author(s):
- Release date: January 2017
- Publisher(s): De Gruyter
- ISBN: 9781501505621
You might also like
book
The Ransomware Threat Landscape
Ransomware will cost companies around the world $20 billion in 2021. Prepare for, recognise and survive …
book
Securing the Internet of Things
Securing the Internet of Things provides network and cybersecurity researchers and practitioners with both the theoretical …
book
Platform Embedded Security Technology Revealed : Safeguarding the Future of Computing with Intel Embedded Security and Management Engine
is an in-depth introduction to Intel's platform embedded solution: the security and management engine. The engine …
video
Windows Network Security Fundamentals
Many organizations now use a hybrid environment in which existing on-premises networks are supplemented by cloud …