O'Reilly logo

Orchestrating and Automating Security for the Internet of Things: Delivering Advanced Security Capabilities from Edge to Cloud for IoT by Marcelo Yannuzzi, Rik Irons-Mclean, Anthony Sabella

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 2. Planning for IoT Security

Securing the Internet of Things poses new challenges to organizations, but as with any system that needs to be secured, certain practical steps can be leveraged. This chapter outlines key considerations to explore as part of a security strategy for IoT.

The Attack Continuum

Before we examine the security implications and requirements for an IoT system, some important points need to be considered.

The first consideration is that security is clearly not a one-off incident; it is a continuum, with before, during, and after phases (see Figure 2-1) and can occur in any area of the IoT system.

An Attack Continuum for the IoT system is shown.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required