IoT Security Issues
IoT Security Issues looks at the burgeoning growth of devices of all kinds controlled over the Internet of all varieties, where product comes first and security second. In this case, security trails badly. This book examines the issues surrounding these problems, vulnerabilities, what can be done to solve the problem, investigating the stack for the roots of the problems and how programming and attention to good security practice can combat the problems today that are a result of lax security processes on the Internet of Things. This book is for people interested in understanding the vulnerabilities on the Internet of Things, such as programmers who have not yet been focusing on the IoT, security professionals and a wide array of interested hackers and makers. This book assumes little experience or knowledge of the Internet of Things. To fully appreciate the book, limited programming background would be helpful for some of the chapters later in the book, though the basic content is explained. The author, Alasdair Gilchrist, has spent 25 years as a company director in the fields of IT, Data Communications, Mobile Telecoms and latterly Cloud/SDN/NFV technologies, as a professional technician, support manager, network and security architect. He has project-managed both agile SDLC software development as well as technical network architecture design. He has experience in the deployment and integration of systems in enterprise, cloud, fixed/mobile telecoms, and service provider networks. He is therefore knowledgeable in a wide range of technologies and has written a number of books in related fields.
What people are saying - Write a review
We haven't found any reviews in the usual places.
Other editions - View all
6LoWPAN application attack authentication Bluetooth cable capabilities chapter cloud CoAP collect communication companies connected devices consumer IoT consumer’s cookies data privacy data protection default deployed despite encryption ensure example exploit Facebook firmware flaws function Furthermore gateway GCHQ Google hack hackers home network hype industry insecure integrity intelligence Internet of Things IoT architecture IoT devices IoT network IoT products IoT security iPhone IPsec IPv6 layer light bulbs malware manufacturer’s manufacturers messages metadata mobile apps MQTT nodes operational packets password percent personal data personal information potential PRISM problem protocols router security issues security practitioners sensors server service providers share smart home smartphone social media stack storage stored sumer surveillance target TCP/IP thermostats threat modeling tion traffic trust typically upgrade UPnP vulnerabilities Wi-Fi wireless Yahoo ZigBee