O'Reilly logo

Orchestrating and Automating Security for the Internet of Things: Delivering Advanced Security Capabilities from Edge to Cloud for IoT by Marcelo Yannuzzi, Rik Irons-Mclean, Anthony Sabella

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 3. IoT Security Fundamentals

The topics covered in this chapter include

   The Building Blocks of IoT

   The IoT Hierarchy

   Primary Attack Targets

   Layered Security Tiers

The Building Blocks of IoT

We know that IoT is here to stay. We also know that designing and securing an IoT system that provides genuine business value involves potentially a lot of complexity. Key issues to consider include the following:

   Standardized scalable solutions have challenging integration requirements.

   IoT growth is expanding beyond the support capability of traditional IT staff, from both scaling and skillset perspectives.

   Managing and orchestrating systems creates additional intricacy because of dissimilar hardware and software, the ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required