Abstract

As Internet of things (IoT) devices grow more and more popular, IoT cyber security becomes ever more pertinent to ensure the confidentiality, integrity, and authenticity of the device and the data it may have access to. IoT systems are composed of many areas, from the physical device to the cloud to its users, there are numerous areas that must be taken into consideration when attempting to secure an IoT system. This chapter builds from the ground up specificities about IoT cyber security. It details how to identify threats, provides tools which can be used to identify threats, identifies ways to secure vulnerable areas of an IoT system, and tools for monitoring system components.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call