|
Showing 1 - 3 of
3 matches in All Departments
This book reviews IoT-centric vulnerabilities from a
multidimensional perspective by elaborating on IoT attack vectors,
their impacts on well-known security objectives, attacks which
exploit such vulnerabilities, coupled with their corresponding
remediation methodologies. This book further highlights the
severity of the IoT problem at large, through disclosing incidents
of Internet-scale IoT exploitations, while putting forward a
preliminary prototype and associated results to aid in the IoT
mitigation objective. Moreover, this book summarizes and discloses
findings, inferences, and open challenges to inspire future
research addressing theoretical and empirical aspects related to
the imperative topic of IoT security. At least 20 billion devices
will be connected to the Internet in the next few years. Many of
these devices transmit critical and sensitive system and personal
data in real-time. Collectively known as "the Internet of Things"
(IoT), this market represents a $267 billion per year industry. As
valuable as this market is, security spending on the sector barely
breaks 1%. Indeed, while IoT vendors continue to push more IoT
devices to market, the security of these devices has often fallen
in priority, making them easier to exploit. This drastically
threatens the privacy of the consumers and the safety of
mission-critical systems. This book is intended for cybersecurity
researchers and advanced-level students in computer science.
Developers and operators working in this field, who are eager to
comprehend the vulnerabilities of the Internet of Things (IoT)
paradigm and understand the severity of accompanied security issues
will also be interested in this book.
This book reviews IoT-centric vulnerabilities from a
multidimensional perspective by elaborating on IoT attack vectors,
their impacts on well-known security objectives, attacks which
exploit such vulnerabilities, coupled with their corresponding
remediation methodologies. This book further highlights the
severity of the IoT problem at large, through disclosing incidents
of Internet-scale IoT exploitations, while putting forward a
preliminary prototype and associated results to aid in the IoT
mitigation objective. Moreover, this book summarizes and discloses
findings, inferences, and open challenges to inspire future
research addressing theoretical and empirical aspects related to
the imperative topic of IoT security. At least 20 billion devices
will be connected to the Internet in the next few years. Many of
these devices transmit critical and sensitive system and personal
data in real-time. Collectively known as "the Internet of Things"
(IoT), this market represents a $267 billion per year industry. As
valuable as this market is, security spending on the sector barely
breaks 1%. Indeed, while IoT vendors continue to push more IoT
devices to market, the security of these devices has often fallen
in priority, making them easier to exploit. This drastically
threatens the privacy of the consumers and the safety of
mission-critical systems. This book is intended for cybersecurity
researchers and advanced-level students in computer science.
Developers and operators working in this field, who are eager to
comprehend the vulnerabilities of the Internet of Things (IoT)
paradigm and understand the severity of accompanied security issues
will also be interested in this book.
This book overviews the drivers behind the smart city vision,
describes its dimensions and introduces the reference architecture.
It further enumerates and classifies threats targeting the smart
city concept, links corresponding attacks, and traces the impact of
these threats on operations, society and the environment. This book
also introduces analytics-driven situational awareness, provides an
overview of the respective solutions and highlights the prevalent
limitations of these methods. The research agenda derived from the
study emphasizes the demand and challenges for developing holistic
approaches to transition these methods to practice equipping the
user with extensive knowledge regarding the detected attack instead
of a sole indicator of ongoing malicious events. It introduces a
cyber-situational awareness framework that can be integrated into
smart city operations to provide timely evidence-based insights
regarding cyber incidents and respective system responses to assist
decision-making. This book targets researchers working in
cybersecurity as well as advanced-level computer science students
focused on this field. Cybersecurity operators will also find this
book useful as a reference guide.
|
|