دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
ویرایش: Second نویسندگان: Brian Russell, Drew Van Duren سری: ISBN (شابک) : 9781788622844, 1788622847 ناشر: سال نشر: 2018 تعداد صفحات: 374 زبان: English فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) حجم فایل: 14 مگابایت
در صورت تبدیل فایل کتاب Practical internet of things security : design a security framework for an Internet connected ecosystem به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب امنیت عملی اینترنت اشیا:: طراحی یک چارچوب امنیتی برای اکوسیستم متصل به اینترنت نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
Cover Title Page Copyright and Credits Dedication About Packt Contributors Table of Contents Preface Chapter 1: A Brave New World Defining the IoT Defining cyber-physical systems Cybersecurity versus IoT security The IoT of today An IoT-enabled energy grid Modernizing the transportation ecosystem Smart manufacturing Smart cities spread across the globe The importance of cross-industry collaboration The IoT ecosystem Physical devices and controllers The hardware Real-time operating systems Gateways IoT integration platforms and solutions Connectivity Transport protocols Network protocols Data link and physical protocols IEEE 802.15.4 ZWave Bluetooth low energy Cellular communications Messaging protocols MQTT CoAP XMPP DDS AMQP Data accumulation Data abstraction Applications Collaboration and processing The IoT of tomorrow Autonomous systems Cognitive systems Summary Chapter 2: Vulnerabilities, Attacks, and Countermeasures Primer on threats, vulnerability, and risks The classic pillars of information assurance Threats Vulnerability Risks Primer on attacks and countermeasures Common IoT attack types Attack trees Building an attack tree Fault (failure) trees and CPS Fault tree and attack tree differences Merging fault and attack tree analysis Example anatomy of a deadly cyber-physical attack Today's IoT attacks Attacks Authentication attacks Distributed Denial of Service (DDoS) Application security attacks Wireless reconnaissance and mapping Security protocol attacks Physical security attacks Lessons learned and systematic approaches Threat modeling an IoT system Step 1 – identify the assets Step 2 – create a system/architecture overview Step 3 – decompose the IoT system Step 4 – identify threats Step 5 – document the threats Step 6 – rate the threats Summary Chapter 3: Approaches to Secure Development The Secure Development Life Cycle (SDLC) Waterfall Requirements Design Implementation Verification Spiral Agile Security engineering in Agile DevOps Handling non-functional requirements Security Threat modeling Other sources for security requirements Safety Hazard analysis Hazard and operability studies (HAZOPs) Fault-tree analysis Failure modes and effects analysis (FMEA) Resilience The need for software transparency Automated security analysis Engaging with the research community Summary Chapter 4: Secure Design of IoT Devices The challenge of secure IoT development Speed to market matters Internet-connected devices face a deluge of attacks The IoT introduces new threats to user privacy IoT products and systems can be physically compromised Skilled security engineers are hard to find (and retain) Secure design goals Design IoT systems that mitigate automated attack risks Design IoT systems with secure points of integration Designing IoT systems to protect confidentiality and integrity Applying cryptography to secure data at rest and in motion Enabling visibility into the data life cycle and protecting data from manipulation Implementing secure OTA Design IoT systems that are safe Design IoT systems using hardware protection measures Introduce secure hardware components within your IoT system Incorporate anti-tamper mechanisms that report and/or react to attempted physical compromise Design IoT systems that remain available Cloud availability Guarding against unplanned equipment failure Load balancing Design IoT systems that are resilient Protecting against jamming attacks Device redundancy Gateway caching Digital configurations Gateway clustering Rate limiting Congestion control Provide flexible policy and security management features to administrators Provide logging mechanisms and feed integrity-protected logs to the cloud for safe storage Design IoT systems that are compliant The US IoT Cybersecurity Improvement Act (draft) ENISA's baseline security recommendations DHS guiding principles for secure IoT FDA guidance on IoT medical devices Summary Chapter 5: Operational Security Life Cycle Defining your security policies Defining system roles Configuring gateway and network security Securing WSN Establishing good key management practices for WSNs. Establishing physical protections Ports, protocols, and services Gateways Network services Network segmentation and network access controls Bootstrapping and securely configuring devices Configuring device security Setting up threat intelligence and vulnerability tracking Vulnerability tracking Threat intelligence Honeypots Managing assets Managing keys and certificates Handling misbehavior Managing accounts, passwords, and authorizations Managing firmware and patching updates Monitoring your system RF monitoring Training system stakeholders Security awareness training for employees Security administration training for the IoT Performing penetration testing Red and blue teams Evaluating hardware security The airwaves IoT penetration test tools Managing compliance HIPAA GDPR Monitoring for compliance Managing incidents Performing forensics Performing end-of-life maintenance Secure device disposal and zeroization Data purging Inventory control Data archiving and managing records Summary Chapter 6: Cryptographic Fundamentals for IoT Security Engineering Cryptography and its role in securing the IoT Types and uses of cryptographic primitives in the IoT Encryption and decryption Symmetric encryption Block chaining modes Counter modes Asymmetric encryption Hashes Digital signatures Symmetric (MACs) Random number generation Ciphersuites Cryptographic module principles Cryptographic key management fundamentals Key generation Key establishment Key derivation Key storage Key escrow Key lifetime Key zeroization Accounting and management Summary of key management recommendations Examining cryptographic controls for IoT protocols Cryptographic controls built into IoT communication protocols ZigBee Bluetooth-LE Near Field Communication (NFC) Cryptographic controls built into IoT messaging protocols MQTT CoAP DDS REST Future-proofing IoT cryptography Crypto agility Post quantum cryptography Summary Chapter 7: Identity and Access Management Solutions for the IoT An introduction to IAM for the IoT The identity life cycle Establish naming conventions and uniqueness requirements Naming a device Secure bootstrap Credential and attribute provisioning Local access Account monitoring and control Account updates Account suspension Account/credential deactivation/deletion Authentication credentials Passwords Symmetric keys Certificates X.509 IEEE 1609.2 Biometrics Authorization for the IoT IoT IAM infrastructure 802.1x PKI for the IoT PKI primer Trust stores PKI architecture for privacy Revocation support OCSP OCSP stapling SSL pinning Authorization and access control OAuth 2.0 Authorization and access controls within publish/subscribe protocols Access controls within communication protocols Decentralized trust via blockchain ledgers Summary Chapter 8: Mitigating IoT Privacy Concerns Privacy challenges introduced by the IoT A complex sharing environment Wearables Smart homes Metadata can leak private information New privacy approaches for credentials Privacy impacting on IoT security systems New methods of surveillance Guide to performing an IoT PIA Overview Authorities Characterizing collected information Uses of collected information Security Notice Data retention Information sharing Redress Auditing and accountability Privacy by design Privacy engineering recommendations Privacy throughout the organization Privacy-engineering professionals Privacy-engineering activities Understanding the privacy landscape Summary Chapter 9: Setting Up an IoT Compliance Monitoring Program IoT compliance Implementing IoT systems in a compliant manner An IoT compliance program Executive oversight Policies, procedures, and documentation Training and education Skills assessments Cybersecurity tools Data security Defense in depth Privacy The IoT, networks, and the cloud Threats/attacks Certifications Testing Internal compliance monitoring Install/update sensors Automated search for flaws Collect results Triage Bug fixes Reporting System design updates Periodic risk assessments Black box testing White box assessments Fuzz testing A complex compliance environment Challenges associated with IoT compliance Examining existing compliance standards, support for the IoT Underwriters Laboratory IoT certification NERC CIP HIPAA/HITECH PCI DSS The NIST Risk Management Framework (RMF) Summary Chapter 10: Cloud Security for the IoT The role of the cloud in IoT systems A notional cloud security approach Moving back toward the edge The concept of the fog Threats to cloud IoT services Cloud-based security services for the IoT Device onboarding Hardware-to-cloud security Identity registries Naming your devices Onboarding a device into AWS IoT Key and certificate management Third-party solutions Policy management Group management Permissions Persistent configuration management Gateway security Authentication to the gateway Device management Compliance monitoring Security monitoring Summary Chapter 11: IoT Incident Response and Forensic Analysis Threats to both safety and security Defining, planning, and executing an IoT incident response Incident response planning IoT system categorization IoT incident response procedures The cloud provider's role IoT incident response team composition Communication planning Operationalizing an IRP in your organization Detection and analysis Analyzing the compromised system Analyzing the IoT devices involved Escalation and monitoring Containment, eradication, and recovery Post-incident activities (recovery) IoT forensics Post-incident device forensics New data sources for crime solving Smart electrical meters and water meters Wearables Home security cameras Home assistants Summary Other Books You May Enjoy Index