Chapter
Licensed
Unlicensed
Requires Authentication
Part I: Making Sense of the Hype
-
Alasdair Gilchrist
You are currently not able to access this content.
You are currently not able to access this content.
Chapters in this book
- Frontmatter i
- Acknowledgements vii
- Contents ix
- Introduction 1
- Part I: Making Sense of the Hype 3
- Chapter 1 – The Consumer Internet of Things 5
- Part II: Security 25
- Chapter 2 – It’s Not Just About the Future 27
- Chapter 3 – Flawed, Insecure Devices 35
- Chapter 4 – Securing the Unidentified 43
- Chapter 5 – Consumer Convenience Trumps Security 49
- Chapter 6 – Startups Driving the IoT 55
- Chapter 7 – Cyber-Security and the Customer Experience 57
- Chapter 8 – Security Requirements for the IoT 65
- Chapter 9 – Re-engineering the IoT 71
- Chapter 10 – IoT Production, Security and Strength 79
- Chapter 11 – Wearable’s – A New Developer’s Headache 85
- Chapter 12 – New Surface Threats 97
- Part III: Architecting the Secure IoT 105
- Chapter 13 – Designing the Secure IoT 107
- Chapter 14 – Secure IoT Architecture Patterns 117
- Chapter 15 – Threat Models 121
- Part IV: Defending the IoT 129
- Chapter 16 – Threats, Vulnerabilities and Risks 131
- Chapter 17 – IoT Security Framework 135
- Chapter 18 – Secure IoT Design 141
- Chapter 19 – Utilizing IPv6 Security Features 159
- Part V: Trust 167
- Chapter 20 – The IoT of Trust 169
- Chapter 21 – It’s All About the Data 175
- Chapter 22 – Trusting the Device 185
- Chapter 23 – Who Can We Trust? 191
- Part VI: Privacy 199
- Chapter 24 – Personal Private Information (PIP) 201
- Chapter 25 – The U.S. and EU Data Privacy Shield 217
- Part VII: Surveillance, Subterfuge and Sabotage 227
- Chapter 26 – The Panopticon 229
- Index 257
Chapters in this book
- Frontmatter i
- Acknowledgements vii
- Contents ix
- Introduction 1
- Part I: Making Sense of the Hype 3
- Chapter 1 – The Consumer Internet of Things 5
- Part II: Security 25
- Chapter 2 – It’s Not Just About the Future 27
- Chapter 3 – Flawed, Insecure Devices 35
- Chapter 4 – Securing the Unidentified 43
- Chapter 5 – Consumer Convenience Trumps Security 49
- Chapter 6 – Startups Driving the IoT 55
- Chapter 7 – Cyber-Security and the Customer Experience 57
- Chapter 8 – Security Requirements for the IoT 65
- Chapter 9 – Re-engineering the IoT 71
- Chapter 10 – IoT Production, Security and Strength 79
- Chapter 11 – Wearable’s – A New Developer’s Headache 85
- Chapter 12 – New Surface Threats 97
- Part III: Architecting the Secure IoT 105
- Chapter 13 – Designing the Secure IoT 107
- Chapter 14 – Secure IoT Architecture Patterns 117
- Chapter 15 – Threat Models 121
- Part IV: Defending the IoT 129
- Chapter 16 – Threats, Vulnerabilities and Risks 131
- Chapter 17 – IoT Security Framework 135
- Chapter 18 – Secure IoT Design 141
- Chapter 19 – Utilizing IPv6 Security Features 159
- Part V: Trust 167
- Chapter 20 – The IoT of Trust 169
- Chapter 21 – It’s All About the Data 175
- Chapter 22 – Trusting the Device 185
- Chapter 23 – Who Can We Trust? 191
- Part VI: Privacy 199
- Chapter 24 – Personal Private Information (PIP) 201
- Chapter 25 – The U.S. and EU Data Privacy Shield 217
- Part VII: Surveillance, Subterfuge and Sabotage 227
- Chapter 26 – The Panopticon 229
- Index 257