ORPP logo
Image from Google Jackets

Understanding Cyberrisks in IoT : When Smart Things Turn Against You.

By: Material type: TextTextSeries: Studien Zum Physik- und Chemielernen SeriesPublisher: New York : Business Expert Press, 2019Copyright date: ©2019Edition: 1st edDescription: 1 online resource (141 pages)Content type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9781948976657
Subject(s): Genre/Form: Additional physical formats: Print version:: Understanding Cyberrisks in IoTDDC classification:
  • 005.8
LOC classification:
  • QA76.9.A25 .B694 2019
Online resources:
Contents:
Cover -- Understanding Cyberrisks in IoT: When Smart Things Turn Against You -- Copyright -- Contents -- Acknowledgments -- Chapter 1: Introduction-What Is IoT? -- Chapter 2: Real Attack Cases-It Is Not Science Fiction, Smart Things Can Turn against You -- Chapter 3: Vulnerability Assessments and Hacking Experiments-The Risk Is There, Just Waiting for a Hacker with Enough Motivation -- Chapter 4: Why Is IoT Especially Vulnerable? Requirements and Challenges. -- Chapter 5: IoT in an Office Environment-Printers, Smart TVs, Routers, and Uninvited Guests -- Chapter 6: IoT in an Industrial Environment-Industrial Control Systems and Industry 4.0 -- Chapter 7: IoT in Utilities and Service Monitoring-Smart Meters and Other Stuff -- Chapter 8: Typical Types of Attacks Targeting IoT Systems-Understanding What Can Go Wrong -- Chapter 9: Lessons Learned-Getting a Better Idea about How to Handle the Risks -- Chapter 10: Conclusions-Now What Do I Do with This Information? -- References -- About the Author -- Index -- Ad Page -- Back Cover.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
No physical items for this record

Cover -- Understanding Cyberrisks in IoT: When Smart Things Turn Against You -- Copyright -- Contents -- Acknowledgments -- Chapter 1: Introduction-What Is IoT? -- Chapter 2: Real Attack Cases-It Is Not Science Fiction, Smart Things Can Turn against You -- Chapter 3: Vulnerability Assessments and Hacking Experiments-The Risk Is There, Just Waiting for a Hacker with Enough Motivation -- Chapter 4: Why Is IoT Especially Vulnerable? Requirements and Challenges. -- Chapter 5: IoT in an Office Environment-Printers, Smart TVs, Routers, and Uninvited Guests -- Chapter 6: IoT in an Industrial Environment-Industrial Control Systems and Industry 4.0 -- Chapter 7: IoT in Utilities and Service Monitoring-Smart Meters and Other Stuff -- Chapter 8: Typical Types of Attacks Targeting IoT Systems-Understanding What Can Go Wrong -- Chapter 9: Lessons Learned-Getting a Better Idea about How to Handle the Risks -- Chapter 10: Conclusions-Now What Do I Do with This Information? -- References -- About the Author -- Index -- Ad Page -- Back Cover.

Description based on publisher supplied metadata and other sources.

Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2024. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.

There are no comments on this title.

to post a comment.

© 2024 Resource Centre. All rights reserved.