Book descriptionThis book is for everybody that wants to learn a little bit more about how cybersecurity is becoming more relevant in the connected world, both present and future.
As much as companies have increased their awareness about cybersecurity, not all of them are taking effective measures to protect themselves and their customers. Many “smart” things or “IoT” devices get connected every year, allowing the creation of more efficient and even new products and services. However, this also brings new risks, considering also that these type of systems present additional challenges for applying cybersecurity measures. This often leaves many doors open to malicious hackers!
This book explains different ways how these systems get exposed to cyber-attacks in a friendly language using real cases as examples. Business professionals and nontechnical readers can bene t from this book by learning that cybersecurity is not an IT problem but an organizational problem. As a leader and decision maker, having an understanding of IoT cyberrisks can help you to improve the preparedness of your organization to prevent and deal with cyberattacks. Overall this book is for everybody that wants to learn a little bit more about how cybersecurity is becoming more relevant in the connected world, both present and future.
Table of contents
- Half Title Page
- Title Page
- Chapter 1 Introduction—What Is IoT?
- Chapter 2 Real Attack Cases—It Is Not Science Fiction, Smart Things Can Turn against You
- Chapter 3 Vulnerability Assessments and Hacking Experiments—The Risk Is There, Just Waiting for a Hacker with Enough Motivation
- Chapter 4 Why Is IoT Especially Vulnerable? Requirements and Challenges
- Chapter 5 IoT in an Office Environment—Printers, Smart TVs, Routers, and Uninvited Guests
- Chapter 6 IoT in an Industrial Environment—Industrial Control Systems and Industry 4.0
- Chapter 7 IoT in Utilities and Service Monitoring—Smart Meters and Other Stuff
- Chapter 8 Typical Types of Attacks Targeting IoT Systems—Understanding What Can Go Wrong
- Chapter 9 Lessons Learned—Getting a Better Idea about How to Handle the Risks
- Chapter 10 Conclusions—Now What Do I Do with This Information?
- About the Author
- Title: Understanding Cyberrisks in IoT
- Release date: May 2019
- Publisher(s): Business Expert Press
- ISBN: 9781948976657
You might also like
Fog and Edge Computing
A comprehensive guide to Fog and Edge applications, architectures, and technologies Recent years have seen the …
Cybersecurity Blue Team Toolkit
A practical handbook to cybersecurity for both tech and non-tech professionals As reports of major data …
Internet of Things
This book addresses researchers and graduate students at the forefront of study/research on the Internet of …
Hacking Exposed Industrial Control Systems: ICS and SCADA Security Secrets & Solutions
Learn to defend crucial ICS/SCADA infrastructure from devastating attacks the tried-and-true Hacking Exposed way This practical …