Book description
Discover high-value Azure security insights, tips, and operational optimizations
Master powerful techniques and approaches for securing IoT systems of all kinds–current and emerging
Internet of Things (IoT) technology adoption is accelerating, but IoT presents complex new security challenges. Fortunately, IoT standards and standardized architectures are emerging to help technical professionals systematically harden their IoT environments. In Orchestrating and Automating Security for the Internet of Things, three Cisco experts show how to safeguard current and future IoT systems by delivering security through new NFV and SDN architectures and related IoT security standards.
The authors first review the current state of IoT networks and architectures, identifying key security risks associated with nonstandardized early deployments and showing how early adopters have attempted to respond. Next, they introduce more mature architectures built around NFV and SDN. You’ll discover why these lend themselves well to IoT and IoT security, and master advanced approaches for protecting them. Finally, the authors preview future approaches to improving IoT security and present real-world use case examples.
This is an indispensable resource for all technical and security professionals, business security and risk managers, and consultants who are responsible for systems that incorporate or utilize IoT devices, or expect to be responsible for them.
· Understand the challenges involved in securing current IoT networks and architectures
· Master IoT security fundamentals, standards, and modern best practices
· Systematically plan for IoT security
· Leverage Software-Defined Networking (SDN) and Network Function Virtualization (NFV) to harden IoT networks
· Deploy the advanced IoT platform, and use MANO to manage and orchestrate virtualized network functions
· Implement platform security services including identity, authentication, authorization, and accounting
· Detect threats and protect data in IoT environments
· Secure IoT in the context of remote access and VPNs
· Safeguard the IoT platform itself
· Explore use cases ranging from smart cities and advanced energy systems to the connected car
· Preview evolving concepts that will shape the future of IoT security ..
Table of contents
- Cover
- About this eBook
- Title Page
- Copyright Page
- About the Author(s)
- Dedications
- Acknowledgments
- Contents at a Glance
- Contents
- Reader Services
- Icons Used in This Book
- Command Syntax Conventions
- Foreword: The Challenge and Opportunity of IoT Security
- Introduction
- Part I. Introduction to the Internet of Things (IoT) and IoT Security
- Part II. Leveraging Software-Defined Networking (SDN) and Network Function Virtualization (NFV) for IoT
-
Part III. Security Services: For the Platform, by the Platform
-
Chapter 9. Identity, Authentication, Authorization, and Accounting
- Introduction to Identity and Access Management for the IoT
- Access Control
- Authentication Methods
- Dynamic Authorization Privileges
- Manufacturer Usage Description
- AWS Policy-based Authorization with IAM
- Accounting
- Scaling IoT Identity and Access Management with Federation Approaches
- Evolving Concepts: Need for Identity Relationship Management
- Summary
- References
-
Chapter 10. Threat Defense
- Centralized and Distributed Deployment Options for Security Services
- Fundamental Network Firewall Technologies
- Industrial Protocols and the Need for Deeper Packet Inspection
- Alternative Solution: Deep Packet Inspection
- Application Visibility and Control
- Intrusion Detection System and Intrusion Prevention System
- Advanced Persistent Threats and Behavioral Analysis
- Malware Protection and Global Threat Intelligence
- DNS-Based Security
- Centralized Security Services Deployment Example Using NSO, ESC, and OpenStack
- Distributed Security Services Deployment Example Using Cisco Network Function Virtualization Infrastructure Software (NFVIS)
- Summary
- References
- Chapter 11. Data Protection in IoT
- Chapter 12. Remote Access and Virtual Private Networks (VPN)
- Chapter 13. Securing the Platform Itself
-
Chapter 9. Identity, Authentication, Authorization, and Accounting
-
Part IV. Use Cases and Emerging Standards and Technologies
-
Chapter 14. Smart Cities
- Use Cases Introduction
- The Evolving Technology Landscape for IoT
- The Next-Generation IoT Platform for Delivering Use Cases Across Verticals: A Summary
- Smart Cities
- Smart Cities Overview
- The IoT and Secure Orchestration Opportunity in Cities
- Security in Smart Cities
- Smart Cities Example Use Cases
- Summary
- References
-
Chapter 15. Industrial Environments: Oil and Gas
- Industry Overview
- The IoT and Secure Automation Opportunity in Oil and Gas
- The Upstream Environment
- The Midstream Environment
- The Downstream and Processing Environments
- Security in Oil and Gas
- Oil and Gas Security and Automation Use Cases: Equipment Health Monitoring and Engineering Access
- Evolving Architectures to Meet New Use Case Requirements
- Summary
- References
- Chapter 16. The Connected Car
-
Chapter 17. Evolving Concepts That Will Shape the Security Service Future
- A Smarter, Coordinated Approach to IoT Security
- Blockchain Overview
- Blockchain for IoT Security
- Machine Learning and Artificial Intelligence Overview
- Machine Learning
- Deep Learning
- Natural Language Processing and Understanding
- Neural Networks
- Computer Vision
- Affective Computing
- Cognitive Computing
- Contextual Awareness
- Machine Learning and Artificial Intelligence for IoT Security
- Summary
- References
-
Chapter 14. Smart Cities
- Index
- Code Snippets
Product information
- Title: Orchestrating and Automating Security for the Internet of Things: Delivering Advanced Security Capabilities from Edge to Cloud for IoT
- Author(s):
- Release date: June 2018
- Publisher(s): Cisco Press
- ISBN: 9780134756936
You might also like
book
Infrastructure as Code, 2nd Edition
Six years ago, Infrastructure as Code was a new concept. Today, as even banks and other …
book
Microsoft Azure Networking: The Definitive Guide
For cloud environments to operate and scale as they should, their networking components must be designed …
book
Database Internals
When it comes to choosing, using, and maintaining a database, understanding its internals is essential. But …
book
Practical Cloud Security
With their rapidly changing architecture and API-driven automation, cloud platforms come with unique security challenges and …