Understanding Cyberrisks in IoT : When Smart Things Turn Against You.
Adaros Boye, Carolina A.
Understanding Cyberrisks in IoT : When Smart Things Turn Against You. - 1st ed. - 1 online resource (141 pages) - Studien Zum Physik- und Chemielernen Series . - Studien Zum Physik- und Chemielernen Series .
Cover -- Understanding Cyberrisks in IoT: When Smart Things Turn Against You -- Copyright -- Contents -- Acknowledgments -- Chapter 1: Introduction-What Is IoT? -- Chapter 2: Real Attack Cases-It Is Not Science Fiction, Smart Things Can Turn against You -- Chapter 3: Vulnerability Assessments and Hacking Experiments-The Risk Is There, Just Waiting for a Hacker with Enough Motivation -- Chapter 4: Why Is IoT Especially Vulnerable? Requirements and Challenges. -- Chapter 5: IoT in an Office Environment-Printers, Smart TVs, Routers, and Uninvited Guests -- Chapter 6: IoT in an Industrial Environment-Industrial Control Systems and Industry 4.0 -- Chapter 7: IoT in Utilities and Service Monitoring-Smart Meters and Other Stuff -- Chapter 8: Typical Types of Attacks Targeting IoT Systems-Understanding What Can Go Wrong -- Chapter 9: Lessons Learned-Getting a Better Idea about How to Handle the Risks -- Chapter 10: Conclusions-Now What Do I Do with This Information? -- References -- About the Author -- Index -- Ad Page -- Back Cover.
9781948976657
Cyber intelligence (Computer security).
Electronic books.
QA76.9.A25 .B694 2019
005.8
Understanding Cyberrisks in IoT : When Smart Things Turn Against You. - 1st ed. - 1 online resource (141 pages) - Studien Zum Physik- und Chemielernen Series . - Studien Zum Physik- und Chemielernen Series .
Cover -- Understanding Cyberrisks in IoT: When Smart Things Turn Against You -- Copyright -- Contents -- Acknowledgments -- Chapter 1: Introduction-What Is IoT? -- Chapter 2: Real Attack Cases-It Is Not Science Fiction, Smart Things Can Turn against You -- Chapter 3: Vulnerability Assessments and Hacking Experiments-The Risk Is There, Just Waiting for a Hacker with Enough Motivation -- Chapter 4: Why Is IoT Especially Vulnerable? Requirements and Challenges. -- Chapter 5: IoT in an Office Environment-Printers, Smart TVs, Routers, and Uninvited Guests -- Chapter 6: IoT in an Industrial Environment-Industrial Control Systems and Industry 4.0 -- Chapter 7: IoT in Utilities and Service Monitoring-Smart Meters and Other Stuff -- Chapter 8: Typical Types of Attacks Targeting IoT Systems-Understanding What Can Go Wrong -- Chapter 9: Lessons Learned-Getting a Better Idea about How to Handle the Risks -- Chapter 10: Conclusions-Now What Do I Do with This Information? -- References -- About the Author -- Index -- Ad Page -- Back Cover.
9781948976657
Cyber intelligence (Computer security).
Electronic books.
QA76.9.A25 .B694 2019
005.8