O'Reilly logo

IoT Security Issues by Alasdair Gilchrist

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 15–Threat Models

In this chapter, we discuss Threat Models in detail, what they are and how we use them to provide secure designs. We will consider the design principles and stages of threat modeling and how we apply these techniques to the conceptual framework of the design to ensure that security is by design. Later we will show how to use the six-step approach to threat modeling and learn about more advanced IoT specific threat models and how to apply them to design frameworks.

In this chapter the reader will learn:

  1. What are threat models
  2. How to we apply threat models
  3. The 6 steps to building threat models
  4. Advanced threat models
  5. IoT vulnerabilities & threats

Once the architects have proposed a conceptual framework for the design ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required